Jump to content
Not connected, Your IP: 18.191.103.144

Recommended Posts

I am unable to connect to any server. I get constant disconnects.

I downgraded the Tap driver already. Grateful for every help. I have been trying for hours, but I don't get anywhere.

This is my first day after switching from nvpn.net. I hope you can help me. Neither the Airvpn, nor the opvn client work for me.

 

I 2016.03.10 21:28:14 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.03.10 21:28:14 - Reading options from C:\Users\phisch\AppData\Local\AirVPN\AirVPN.xml
. 2016.03.10 21:28:14 - Data Path: C:\Users\phisch\AppData\Local\AirVPN
. 2016.03.10 21:28:14 - App Path: C:\Program Files\AirVPN
. 2016.03.10 21:28:14 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.03.10 21:28:14 - Command line arguments (1): path="home"
. 2016.03.10 21:28:14 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.03.10 21:28:14 - Updating systems & servers data ...
. 2016.03.10 21:28:14 - Systems & servers data update completed
I 2016.03.10 21:28:16 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.03.10 21:28:16 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.03.10 21:28:16 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.03.10 21:28:16 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.03.10 21:28:16 - Ready
I 2016.03.10 21:33:05 - Session starting.
W 2016.03.10 21:33:05 - Tunnel driver will be upgraded, from 9.9.1 to 9.21.1.
! 2016.03.10 21:33:05 - Installing tunnel driver
I 2016.03.10 21:33:12 - IPv6 disabled.
I 2016.03.10 21:33:12 - Checking authorization ...
! 2016.03.10 21:33:13 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:33:13 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:33:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:33:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:33:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:33:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:33:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:33:13 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:33:13 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:33:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:33:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=4d2d37fb e1db6844
. 2016.03.10 21:33:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:33:13 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:33:13 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:33:13 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:33:13 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:33:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:33:13 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:33:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:33:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:33:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:33:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:33:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:33:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:33:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:33:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:33:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:33:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:33:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:33:18 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:33:18 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{14BF299F-699F-4579-B081-A5B1DC3FDF8C}.tap
. 2016.03.10 21:33:18 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.10 21:33:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:33:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {14BF299F-699F-4579-B081-A5B1DC3FDF8C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:33:18 - OpenVPN > Successful ARP Flush on interface [13] {14BF299F-699F-4579-B081-A5B1DC3FDF8C}
. 2016.03.10 21:33:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:33:23 - Starting Management Interface
. 2016.03.10 21:33:23 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:33:23 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:33:23 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:33:23 - Flushing DNS
I 2016.03.10 21:33:23 - Checking route
W 2016.03.10 21:34:13 - Timeout für Vorgang überschritten
! 2016.03.10 21:34:13 - Disconnecting
. 2016.03.10 21:34:13 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:34:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:34:13 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:34:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:18 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:34:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:34:18 - Connection terminated.
I 2016.03.10 21:34:19 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:34:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:34:22 - Checking authorization ...
! 2016.03.10 21:34:22 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:34:22 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:34:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:34:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:34:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:34:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:34:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:34:22 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:34:22 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:34:22 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:34:22 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=50bd56c3 0e341237
. 2016.03.10 21:34:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:34:22 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:34:22 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:34:22 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:34:22 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:34:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:34:22 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:34:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:34:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:34:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:34:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:34:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:34:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:34:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:34:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:34:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:34:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:34:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:34:27 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:34:27 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{14BF299F-699F-4579-B081-A5B1DC3FDF8C}.tap
. 2016.03.10 21:34:27 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.10 21:34:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:34:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {14BF299F-699F-4579-B081-A5B1DC3FDF8C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:34:27 - OpenVPN > Successful ARP Flush on interface [13] {14BF299F-699F-4579-B081-A5B1DC3FDF8C}
. 2016.03.10 21:34:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:34:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:34:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:34:32 - Starting Management Interface
. 2016.03.10 21:34:32 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:34:32 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:34:32 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:34:32 - Flushing DNS
I 2016.03.10 21:34:32 - Checking route
W 2016.03.10 21:35:22 - Timeout für Vorgang überschritten
! 2016.03.10 21:35:22 - Disconnecting
. 2016.03.10 21:35:22 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:35:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:35:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:35:22 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:35:27 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:35:27 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:35:27 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:35:27 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:35:27 - Connection terminated.
I 2016.03.10 21:35:27 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:35:27 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:35:30 - Checking authorization ...
! 2016.03.10 21:35:30 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:35:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:35:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:35:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:35:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:35:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:30 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:35:30 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:35:30 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:35:30 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=96ca1e25 55a2f2e7
. 2016.03.10 21:35:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:35:30 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:35:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:35:30 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:35:30 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:35:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:35:30 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:35:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:35:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:35:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:35:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:35:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:35:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:35:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:35:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:35:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:35:39 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:35:39 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{14BF299F-699F-4579-B081-A5B1DC3FDF8C}.tap
. 2016.03.10 21:35:39 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.10 21:35:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:35:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {14BF299F-699F-4579-B081-A5B1DC3FDF8C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:35:39 - OpenVPN > Successful ARP Flush on interface [13] {14BF299F-699F-4579-B081-A5B1DC3FDF8C}
. 2016.03.10 21:35:42 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.03.10 21:35:42 - OpenVPN > Exiting due to fatal error
. 2016.03.10 21:35:42 - OpenVPN > Closing TUN/TAP interface
! 2016.03.10 21:35:42 - Disconnecting
. 2016.03.10 21:35:42 - Connection terminated.
I 2016.03.10 21:35:45 - Checking authorization ...
! 2016.03.10 21:35:45 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:35:45 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:35:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:35:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:35:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:35:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:45 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:35:45 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:35:45 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:35:45 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=04efa9f3 2f40cac4
. 2016.03.10 21:35:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:35:45 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:35:45 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:35:45 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:35:45 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:35:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:35:45 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:35:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:35:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:35:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:35:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:35:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:35:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:35:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:35:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:35:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:35:51 - OpenVPN > There are no TAP-Windows adapters on this system.  You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.
. 2016.03.10 21:35:51 - OpenVPN > Exiting due to fatal error
! 2016.03.10 21:35:51 - Disconnecting
. 2016.03.10 21:35:51 - Connection terminated.
I 2016.03.10 21:35:53 - Cancel requested.
I 2016.03.10 21:35:53 - IPv6 restored.
! 2016.03.10 21:35:53 - Session terminated.
I 2016.03.10 21:36:28 - Session starting.
W 2016.03.10 21:36:28 - Tunnel driver will be upgraded, from 9.9.1 to 9.21.1.
! 2016.03.10 21:36:28 - Installing tunnel driver
I 2016.03.10 21:36:34 - IPv6 disabled.
I 2016.03.10 21:36:34 - Checking authorization ...
! 2016.03.10 21:36:34 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:36:34 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:36:34 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:36:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:36:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:36:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:36:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:36:34 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:36:34 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:36:34 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:36:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=77418a7f 4c92e88d
. 2016.03.10 21:36:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:36:34 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:36:34 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:36:34 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:36:34 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:36:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:36:34 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:36:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:36:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:36:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:36:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:36:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:36:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:36:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:36:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:36:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:36:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:36:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:36:39 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:36:39 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap
. 2016.03.10 21:36:39 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.10 21:36:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:36:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:36:39 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}
. 2016.03.10 21:36:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:36:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:36:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:36:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:36:44 - Starting Management Interface
. 2016.03.10 21:36:44 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:36:44 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:36:44 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:36:44 - Flushing DNS
I 2016.03.10 21:36:44 - Checking route
W 2016.03.10 21:37:34 - Timeout für Vorgang überschritten
! 2016.03.10 21:37:34 - Disconnecting
. 2016.03.10 21:37:34 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:37:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:37:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:37:34 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:37:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:39 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:37:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:37:40 - Connection terminated.
I 2016.03.10 21:37:40 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:37:40 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:37:43 - Checking authorization ...
! 2016.03.10 21:37:43 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:37:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:37:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:37:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:37:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:37:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:37:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:37:43 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:37:43 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:37:43 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:37:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=81b54f3a 930c537a
. 2016.03.10 21:37:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:37:43 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:37:43 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:37:43 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:37:43 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:37:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:37:43 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:37:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:37:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:37:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:37:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:37:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:37:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:37:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:37:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:37:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:37:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:37:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:37:48 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:37:48 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap
. 2016.03.10 21:37:48 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.10 21:37:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:37:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:37:48 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}
. 2016.03.10 21:37:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:37:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:37:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:37:53 - Starting Management Interface
. 2016.03.10 21:37:53 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:37:53 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:37:53 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:37:53 - Flushing DNS
I 2016.03.10 21:37:53 - Checking route
W 2016.03.10 21:38:43 - Timeout für Vorgang überschritten
! 2016.03.10 21:38:43 - Disconnecting
. 2016.03.10 21:38:43 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:38:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:38:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:38:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:38:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:38:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:38:48 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:38:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:38:48 - Connection terminated.
I 2016.03.10 21:38:48 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:38:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:38:51 - Checking authorization ...
! 2016.03.10 21:38:51 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:38:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:38:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:38:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:38:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:38:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:38:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:38:51 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:38:51 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:38:51 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:38:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=37c0eeb7 4d02c84c
. 2016.03.10 21:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:38:52 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:38:52 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:38:52 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:38:52 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:38:52 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:38:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:38:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:38:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:38:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:38:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:38:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:38:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:38:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:38:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:38:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:38:57 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:38:57 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap
. 2016.03.10 21:38:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.10 21:38:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:38:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:38:57 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}
. 2016.03.10 21:39:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:39:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:39:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:02 - Starting Management Interface
. 2016.03.10 21:39:02 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:39:02 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:39:02 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:39:02 - Flushing DNS
I 2016.03.10 21:39:02 - Checking route
W 2016.03.10 21:39:52 - Timeout für Vorgang überschritten
! 2016.03.10 21:39:52 - Disconnecting
. 2016.03.10 21:39:52 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:39:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:39:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:39:52 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:39:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:39:57 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:39:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:39:57 - Connection terminated.
I 2016.03.10 21:39:58 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:39:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:40:01 - Checking authorization ...
! 2016.03.10 21:40:01 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:40:01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:40:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:40:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:40:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:40:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:01 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:40:01 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:40:01 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:40:01 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=fd4e0faf 8c078285
. 2016.03.10 21:40:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:40:01 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:40:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:40:01 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:40:01 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:40:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:40:01 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:40:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:40:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:40:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:40:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:40:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:40:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:40:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:40:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:40:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:40:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:40:06 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E3A6E312-F7EE-4F95-9FB4-AA911074EA61}.tap
. 2016.03.10 21:40:06 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.10 21:40:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:40:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {E3A6E312-F7EE-4F95-9FB4-AA911074EA61} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:40:06 - OpenVPN > Successful ARP Flush on interface [13] {E3A6E312-F7EE-4F95-9FB4-AA911074EA61}
. 2016.03.10 21:40:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:40:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:40:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.10 21:40:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:40:10 - Starting Management Interface
. 2016.03.10 21:40:10 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:40:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:40:10 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:40:10 - Flushing DNS
I 2016.03.10 21:40:10 - Checking route
! 2016.03.10 21:40:21 - Disconnecting
. 2016.03.10 21:40:21 - Connection terminated.
E 2016.03.10 21:40:21 - Routing checking failed.
. 2016.03.10 21:40:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.03.10 21:40:21 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.03.10 21:40:21 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.03.10 21:40:21 - OpenVPN > Exiting due to fatal error
. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:40:21 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.03.10 21:40:21 - OpenVPN > Route deletion fallback to route.exe
. 2016.03.10 21:40:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.03.10 21:40:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:40:21 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.03.10 21:40:21 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.03.10 21:40:21 - OpenVPN > Route deletion fallback to route.exe
. 2016.03.10 21:40:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.03.10 21:40:21 - OpenVPN > Closing TUN/TAP interface
I 2016.03.10 21:40:21 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
. 2016.03.10 21:40:24 - Cannot find tunnel adapter.
I 2016.03.10 21:40:24 - Checking authorization ...
! 2016.03.10 21:40:25 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:40:25 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:40:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:40:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:40:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:40:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:25 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:40:25 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:40:25 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:40:25 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=aead2153 32278b1e
. 2016.03.10 21:40:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:40:25 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:40:25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:40:25 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:40:25 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:40:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:40:25 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:40:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:40:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:40:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:40:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:40:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:40:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:40:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:40:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:40:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:40:30 - OpenVPN > There are no TAP-Windows adapters on this system.  You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.
. 2016.03.10 21:40:30 - OpenVPN > Exiting due to fatal error
! 2016.03.10 21:40:30 - Disconnecting
. 2016.03.10 21:40:30 - Connection terminated.
I 2016.03.10 21:40:30 - Cancel requested.
I 2016.03.10 21:40:30 - IPv6 restored.
! 2016.03.10 21:40:30 - Session terminated.
! 2016.03.10 21:43:42 - Activation of Network Lock - Windows Firewall
I 2016.03.10 21:43:54 - Session starting.
. 2016.03.10 21:43:54 - Cannot find tunnel adapter.
! 2016.03.10 21:43:54 - Installing tunnel driver
. 2016.03.10 21:44:02 - Cannot find tunnel adapter.
F 2016.03.10 21:44:02 - Driver installation failed.
I 2016.03.10 21:44:50 - Session starting.
I 2016.03.10 21:44:50 - IPv6 disabled.
I 2016.03.10 21:44:50 - Checking authorization ...
! 2016.03.10 21:44:50 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:44:50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:44:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:44:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:44:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:44:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:44:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:44:50 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:44:50 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:44:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:44:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=d2ce93ee ae0acc94
. 2016.03.10 21:44:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:44:50 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:44:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:44:50 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:44:50 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:44:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:44:50 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:44:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:44:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:44:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:44:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:44:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:44:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:44:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:44:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:44:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:44:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:44:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:44:55 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:44:55 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap
. 2016.03.10 21:44:55 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.10 21:44:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:44:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:44:55 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}
. 2016.03.10 21:45:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:45:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:45:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:45:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:45:00 - Starting Management Interface
. 2016.03.10 21:45:00 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:45:00 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:45:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:45:00 - Flushing DNS
I 2016.03.10 21:45:00 - Checking route
! 2016.03.10 21:45:00 - Connected.
. 2016.03.10 21:45:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.03.10 21:45:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.03.10 21:48:56 - Disconnecting
. 2016.03.10 21:48:56 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:48:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:48:56 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:49:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:49:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:49:01 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:49:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:49:01 - Connection terminated.
I 2016.03.10 21:49:01 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:49:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:49:01 - IPv6 restored.
! 2016.03.10 21:49:01 - Session terminated.
! 2016.03.10 21:49:04 - Deactivation of Network Lock
I 2016.03.10 21:50:31 - Session starting.
I 2016.03.10 21:50:31 - IPv6 disabled.
I 2016.03.10 21:50:31 - Checking authorization ...
! 2016.03.10 21:50:31 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:50:31 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:50:31 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:50:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:50:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:50:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:50:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:50:31 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:50:31 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:50:31 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:50:31 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=0c1a9814 fc369555
. 2016.03.10 21:50:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:50:31 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:50:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:50:31 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:50:31 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:50:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:50:31 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:50:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:50:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:50:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:50:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:50:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:50:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:50:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:50:35 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:50:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:50:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:50:35 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:50:35 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:50:35 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap
. 2016.03.10 21:50:35 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.10 21:50:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:50:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:50:35 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}
. 2016.03.10 21:50:40 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:50:40 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:50:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:50:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:50:40 - Starting Management Interface
. 2016.03.10 21:50:40 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:50:40 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:50:40 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:50:40 - Flushing DNS
I 2016.03.10 21:50:40 - Checking route
W 2016.03.10 21:51:30 - Timeout für Vorgang überschritten
! 2016.03.10 21:51:30 - Disconnecting
. 2016.03.10 21:51:30 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:51:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:51:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:51:30 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:51:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:35 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:51:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:51:35 - Connection terminated.
I 2016.03.10 21:51:35 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:51:35 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:51:38 - Checking authorization ...
! 2016.03.10 21:51:38 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:51:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:51:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:51:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:51:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:51:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:51:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:51:38 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:51:38 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:51:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:51:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=6e098db6 8adf9a5d
. 2016.03.10 21:51:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:51:38 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:51:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:51:38 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:51:38 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:51:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:51:38 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:51:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:51:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:51:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:51:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:51:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:51:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:51:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:51:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:51:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:51:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:51:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:51:43 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:51:43 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap
. 2016.03.10 21:51:43 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.10 21:51:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:51:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:51:43 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}
. 2016.03.10 21:51:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:51:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:51:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:51:48 - Starting Management Interface
. 2016.03.10 21:51:48 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:51:48 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:51:48 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:51:48 - Flushing DNS
I 2016.03.10 21:51:48 - Checking route
W 2016.03.10 21:52:38 - Timeout für Vorgang überschritten
! 2016.03.10 21:52:38 - Disconnecting
. 2016.03.10 21:52:38 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:52:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:52:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:52:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:52:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:43 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:52:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:52:43 - Connection terminated.
I 2016.03.10 21:52:43 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:52:43 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:52:46 - Checking authorization ...
! 2016.03.10 21:52:46 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.10 21:52:46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.10 21:52:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.10 21:52:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.10 21:52:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.10 21:52:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:52:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:52:46 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.10 21:52:46 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.10 21:52:46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.10 21:52:46 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=effa6030 774356e1
. 2016.03.10 21:52:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.10 21:52:46 - OpenVPN > Validating certificate key usage
. 2016.03.10 21:52:46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.10 21:52:46 - OpenVPN > VERIFY KU OK
. 2016.03.10 21:52:46 - OpenVPN > Validating certificate extended key usage
. 2016.03.10 21:52:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.10 21:52:46 - OpenVPN > VERIFY EKU OK
. 2016.03.10 21:52:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.10 21:52:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:52:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:52:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.10 21:52:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.10 21:52:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.10 21:52:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.10 21:52:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.10 21:52:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.10 21:52:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.10 21:52:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.10 21:52:50 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.10 21:52:50 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}.tap
. 2016.03.10 21:52:50 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.10 21:52:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.10 21:52:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.10 21:52:50 - OpenVPN > Successful ARP Flush on interface [13] {BDFCA952-E45F-4B49-AC3D-E276B64D5CB3}
. 2016.03.10 21:52:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:52:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.10 21:52:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.10 21:52:55 - Starting Management Interface
. 2016.03.10 21:52:55 - OpenVPN > Initialization Sequence Completed
I 2016.03.10 21:52:55 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:52:55 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.10 21:52:55 - Flushing DNS
I 2016.03.10 21:52:55 - Checking route
W 2016.03.10 21:53:45 - Timeout für Vorgang überschritten
! 2016.03.10 21:53:45 - Disconnecting
. 2016.03.10 21:53:45 - Management - Send 'signal SIGTERM'
. 2016.03.10 21:53:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.10 21:53:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.10 21:53:45 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:53:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.10 21:53:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.10 21:53:51 - OpenVPN > Closing TUN/TAP interface
. 2016.03.10 21:53:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.10 21:53:51 - Connection terminated.
I 2016.03.10 21:53:51 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.10 21:53:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.10 21:53:51 - Cancel requested.
I 2016.03.10 21:53:51 - IPv6 restored.
! 2016.03.10 21:53:51 - Session terminated.

Share this post


Link to post

OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1

 

There is a special expert on this forum with this "problem".

 

 

W 2016.03.10 21:34:13 - Timeout für Vorgang überschritten

 

Giganerd, please explain why 9.21.1 is ubershitten.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

That's after I really downgraded. It didn't save the option of denying automatic update.

 

I 2016.03.11 01:10:54 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.03.11 01:10:54 - Reading options from C:\Users\phisch\AppData\Local\AirVPN\AirVPN.xml
. 2016.03.11 01:10:54 - Data Path: C:\Users\phisch\AppData\Local\AirVPN
. 2016.03.11 01:10:54 - App Path: C:\Program Files\AirVPN
. 2016.03.11 01:10:54 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.03.11 01:10:54 - Command line arguments (1): path="home"
. 2016.03.11 01:10:54 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.03.11 01:10:54 - Updating systems & servers data ...
. 2016.03.11 01:10:54 - Cannot find tunnel adapter.
. 2016.03.11 01:10:55 - Systems & servers data update completed
E 2016.03.11 01:10:55 - OpenVPN Driver - Not available
I 2016.03.11 01:10:55 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.03.11 01:10:55 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.03.11 01:10:55 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.03.11 01:10:55 - Ready
. 2016.03.11 01:11:05 - Cannot find tunnel adapter.
I 2016.03.11 01:11:25 - Session starting.
I 2016.03.11 01:11:26 - IPv6 disabled.
I 2016.03.11 01:11:26 - Checking authorization ...
! 2016.03.11 01:11:26 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.11 01:11:26 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.11 01:11:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.11 01:11:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.11 01:11:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.11 01:11:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:11:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:11:26 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.11 01:11:26 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.11 01:11:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.11 01:11:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=4baa588c 24e06d1b
. 2016.03.11 01:11:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.11 01:11:26 - OpenVPN > Validating certificate key usage
. 2016.03.11 01:11:26 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.11 01:11:26 - OpenVPN > VERIFY KU OK
. 2016.03.11 01:11:26 - OpenVPN > Validating certificate extended key usage
. 2016.03.11 01:11:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.11 01:11:26 - OpenVPN > VERIFY EKU OK
. 2016.03.11 01:11:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.11 01:11:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:11:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:11:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:11:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:11:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.11 01:11:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.11 01:11:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.11 01:11:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.11 01:11:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.11 01:11:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.11 01:11:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.11 01:11:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.11 01:11:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.11 01:11:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.11 01:11:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.11 01:11:31 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.11 01:11:31 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{123126CE-8E06-439C-8BE8-8358C929E707}.tap
. 2016.03.11 01:11:31 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.11 01:11:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.11 01:11:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {123126CE-8E06-439C-8BE8-8358C929E707} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.11 01:11:31 - OpenVPN > Successful ARP Flush on interface [13] {123126CE-8E06-439C-8BE8-8358C929E707}
. 2016.03.11 01:11:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.11 01:11:36 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:11:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:11:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:11:36 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.11 01:11:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:11:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:11:36 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:11:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:11:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:11:36 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:11:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:11:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:11:36 - Starting Management Interface
. 2016.03.11 01:11:36 - OpenVPN > Initialization Sequence Completed
I 2016.03.11 01:11:36 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:11:36 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.11 01:11:36 - Flushing DNS
I 2016.03.11 01:11:36 - Checking route
W 2016.03.11 01:12:26 - Timeout für Vorgang überschritten
! 2016.03.11 01:12:26 - Disconnecting
. 2016.03.11 01:12:26 - Management - Send 'signal SIGTERM'
. 2016.03.11 01:12:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.11 01:12:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.11 01:12:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.11 01:12:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:12:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:12:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:12:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:12:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:31 - OpenVPN > Closing TUN/TAP interface
. 2016.03.11 01:12:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.11 01:12:31 - Connection terminated.
I 2016.03.11 01:12:31 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:12:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.11 01:12:34 - Checking authorization ...
! 2016.03.11 01:12:34 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.11 01:12:34 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.11 01:12:34 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.11 01:12:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.11 01:12:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.11 01:12:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:12:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:12:34 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.11 01:12:34 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.11 01:12:34 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.11 01:12:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=04e231c6 50ec860a
. 2016.03.11 01:12:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.11 01:12:35 - OpenVPN > Validating certificate key usage
. 2016.03.11 01:12:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.11 01:12:35 - OpenVPN > VERIFY KU OK
. 2016.03.11 01:12:35 - OpenVPN > Validating certificate extended key usage
. 2016.03.11 01:12:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.11 01:12:35 - OpenVPN > VERIFY EKU OK
. 2016.03.11 01:12:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.11 01:12:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:12:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:12:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:12:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:12:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.11 01:12:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.11 01:12:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.11 01:12:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.11 01:12:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.11 01:12:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.11 01:12:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.11 01:12:37 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.11 01:12:37 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.11 01:12:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.11 01:12:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.11 01:12:37 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.11 01:12:37 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{123126CE-8E06-439C-8BE8-8358C929E707}.tap
. 2016.03.11 01:12:37 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.11 01:12:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.11 01:12:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {123126CE-8E06-439C-8BE8-8358C929E707} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.11 01:12:37 - OpenVPN > Successful ARP Flush on interface [13] {123126CE-8E06-439C-8BE8-8358C929E707}
. 2016.03.11 01:12:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.11 01:12:42 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:12:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:12:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:42 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.11 01:12:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:12:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:12:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:12:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:12:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:12:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:12:42 - Starting Management Interface
. 2016.03.11 01:12:42 - OpenVPN > Initialization Sequence Completed
I 2016.03.11 01:12:42 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:12:42 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.11 01:12:42 - Flushing DNS
I 2016.03.11 01:12:42 - Checking route
W 2016.03.11 01:13:32 - Timeout für Vorgang überschritten
! 2016.03.11 01:13:32 - Disconnecting
. 2016.03.11 01:13:32 - Management - Send 'signal SIGTERM'
. 2016.03.11 01:13:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.11 01:13:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.11 01:13:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.11 01:13:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:13:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:13:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:13:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:13:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:37 - OpenVPN > Closing TUN/TAP interface
. 2016.03.11 01:13:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.11 01:13:37 - Connection terminated.
I 2016.03.11 01:13:37 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:13:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.11 01:13:40 - Checking authorization ...
! 2016.03.11 01:13:41 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.11 01:13:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.11 01:13:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.11 01:13:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.11 01:13:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.11 01:13:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:13:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:13:41 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.11 01:13:41 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.11 01:13:41 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.11 01:13:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=7ab908f8 6e235591
. 2016.03.11 01:13:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.11 01:13:41 - OpenVPN > Validating certificate key usage
. 2016.03.11 01:13:41 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.11 01:13:41 - OpenVPN > VERIFY KU OK
. 2016.03.11 01:13:41 - OpenVPN > Validating certificate extended key usage
. 2016.03.11 01:13:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.11 01:13:41 - OpenVPN > VERIFY EKU OK
. 2016.03.11 01:13:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.11 01:13:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:13:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:13:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:13:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:13:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.11 01:13:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.11 01:13:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.11 01:13:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.11 01:13:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.11 01:13:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.11 01:13:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.11 01:13:44 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.11 01:13:44 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.11 01:13:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.11 01:13:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.11 01:13:44 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.11 01:13:44 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{123126CE-8E06-439C-8BE8-8358C929E707}.tap
. 2016.03.11 01:13:44 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.11 01:13:44 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.11 01:13:44 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {123126CE-8E06-439C-8BE8-8358C929E707} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.11 01:13:44 - OpenVPN > Successful ARP Flush on interface [13] {123126CE-8E06-439C-8BE8-8358C929E707}
. 2016.03.11 01:13:49 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.11 01:13:49 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:13:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:13:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:49 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.11 01:13:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:13:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:49 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:13:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:13:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:49 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:13:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:13:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:13:49 - Starting Management Interface
. 2016.03.11 01:13:49 - OpenVPN > Initialization Sequence Completed
I 2016.03.11 01:13:49 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:13:49 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.11 01:13:49 - Flushing DNS
I 2016.03.11 01:13:50 - Checking route
W 2016.03.11 01:14:40 - Timeout für Vorgang überschritten
! 2016.03.11 01:14:40 - Disconnecting
. 2016.03.11 01:14:40 - Management - Send 'signal SIGTERM'
. 2016.03.11 01:14:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.11 01:14:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.11 01:14:40 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.11 01:14:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:14:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:14:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:14:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:14:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:46 - OpenVPN > Closing TUN/TAP interface
. 2016.03.11 01:14:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.11 01:14:46 - Connection terminated.
I 2016.03.11 01:14:46 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:14:46 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.11 01:14:49 - Checking authorization ...
! 2016.03.11 01:14:49 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.11 01:14:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.11 01:14:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.11 01:14:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.11 01:14:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.11 01:14:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:14:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:14:49 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.11 01:14:49 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.11 01:14:49 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.11 01:14:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=515d1d1a 65058c88
. 2016.03.11 01:14:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.11 01:14:49 - OpenVPN > Validating certificate key usage
. 2016.03.11 01:14:49 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.11 01:14:49 - OpenVPN > VERIFY KU OK
. 2016.03.11 01:14:49 - OpenVPN > Validating certificate extended key usage
. 2016.03.11 01:14:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.11 01:14:49 - OpenVPN > VERIFY EKU OK
. 2016.03.11 01:14:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.11 01:14:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:14:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:14:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:14:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:14:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.11 01:14:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.11 01:14:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.11 01:14:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.11 01:14:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.11 01:14:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.11 01:14:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.11 01:14:54 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.11 01:14:54 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.11 01:14:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.11 01:14:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.11 01:14:54 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.11 01:14:54 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{123126CE-8E06-439C-8BE8-8358C929E707}.tap
. 2016.03.11 01:14:54 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.11 01:14:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.11 01:14:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {123126CE-8E06-439C-8BE8-8358C929E707} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.11 01:14:54 - OpenVPN > Successful ARP Flush on interface [13] {123126CE-8E06-439C-8BE8-8358C929E707}
. 2016.03.11 01:14:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.11 01:14:59 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:14:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:14:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:59 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.03.11 01:14:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.11 01:14:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:14:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:14:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:14:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.03.11 01:14:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.11 01:14:59 - Starting Management Interface
. 2016.03.11 01:14:59 - OpenVPN > Initialization Sequence Completed
I 2016.03.11 01:14:59 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:14:59 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.11 01:14:59 - Flushing DNS
I 2016.03.11 01:14:59 - Checking route
W 2016.03.11 01:15:49 - Timeout für Vorgang überschritten
! 2016.03.11 01:15:49 - Disconnecting
. 2016.03.11 01:15:49 - Management - Send 'signal SIGTERM'
. 2016.03.11 01:15:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.11 01:15:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.11 01:15:49 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.11 01:15:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:15:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:15:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.11 01:15:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:15:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:15:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:15:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.11 01:15:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.11 01:15:54 - OpenVPN > Closing TUN/TAP interface
. 2016.03.11 01:15:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.11 01:15:54 - Connection terminated.
I 2016.03.11 01:15:54 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.03.11 01:15:54 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.11 01:15:57 - Checking authorization ...
! 2016.03.11 01:15:57 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.03.11 01:15:57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.11 01:15:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.11 01:15:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.11 01:15:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.11 01:15:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:15:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:15:57 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.03.11 01:15:57 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.11 01:15:57 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.03.11 01:15:57 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=0b7aaa55 103c094a
. 2016.03.11 01:15:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.11 01:15:57 - OpenVPN > Validating certificate key usage
. 2016.03.11 01:15:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.03.11 01:15:57 - OpenVPN > VERIFY KU OK
. 2016.03.11 01:15:57 - OpenVPN > Validating certificate extended key usage
. 2016.03.11 01:15:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.11 01:15:57 - OpenVPN > VERIFY EKU OK
. 2016.03.11 01:15:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.11 01:16:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:16:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:16:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.11 01:16:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.11 01:16:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.11 01:16:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.03.11 01:16:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.11 01:16:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.105 255.255.0.0'
. 2016.03.11 01:16:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.11 01:16:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.11 01:16:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.11 01:16:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.11 01:16:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.11 01:16:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.11 01:16:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.11 01:16:06 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.11 01:16:06 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{123126CE-8E06-439C-8BE8-8358C929E707}.tap
. 2016.03.11 01:16:06 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.03.11 01:16:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.105/255.255.0.0 [sUCCEEDED]
. 2016.03.11 01:16:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.105/255.255.0.0 on interface {123126CE-8E06-439C-8BE8-8358C929E707} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.11 01:16:06 - OpenVPN > Successful ARP Flush on interface [13] {123126CE-8E06-439C-8BE8-8358C929E707}
 

Share this post


Link to post

You probably forgot to check "Disable driver upgrade" under Settings -> Advanced -> General.

So as soon as you started the AirVPN client after downgrading the TAP driver, AirVPN client went ahead and upgraded it again. 

Share this post


Link to post
Posted ... (edited)

I love you. You are one of the first who uses spoilers for your logs without me saying to edit your thread. Thank you very much, you contribute to the readability to AirVPN's threads.

 

Did you follow the directions in the How-To included in my signature? Because I see Eddie has upgraded again.

It seems you appended logs after a downgrade, and the issue persists. So I was right in my previous message:
 

The problem might have nothing to do with TAP as the route check timed out. This is a separate issue.

 

 

When I'm home I'll edit this post and link to it. Be sure to like it to receive a notification or check back later.

Here you are. Have a look at Routing checking failed.

Edited ... by giganerd

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Yes I followed the instructions. You seem to be kind of a celebrity around here. I have seen you in more threads than anyone else x)

Share this post


Link to post

You seem to be kind of a celebrity around here. I have seen you in more threads than anyone else x)

 

Thank you. As far as I know, I'm the user with the second most posts on these forums. Staff are on their "rightful" first place.

I like to be active around here. Most of my posts contribute to discussions or tell users to give more info about their problem (paste your logs posts). Also, I do quite a lot of searching and link to what I found, provided there is a solution (that's why I'm Mr. Searchbeforeyoupost). But I consider around 50-100 of my posts worth the deletion for different reasons.

 

Changing the protocol from UDP to TCP (both port 443) helped.

 

Do know, however, that forcing OpenVPN to use TCP can have an impact on its performance. Try other solutions if your connection speed with VPN drops by more than 10-15%.

Enjoy!


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...