Jump to content
Not connected, Your IP: 3.143.23.38

Recommended Posts

Hi everyone

 

A bit of a noob here but I was hoping I could get some help.

 

I can't connect to any servers on the airvpn network - all of them make it to the routing bit and then "the remote name could not be resolved" comes up. 

 

Any ideas? I did change the DNS settings to Google (8.8.8.8 and 8.8.4.4) but I run another VPN and that logs on fine (before anyone asks, no I don't have them both running at the same time   )

 

Any assistance would be greatly appreciated

 

Thanks

Share this post


Link to post

all of them make it to the routing bit and then "the remote name could not be resolved" comes up.

 

That's not how this works. Post us the whole logfile into spoiler tags (How-To in my signature).


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Sorry I'll try that again as those logs are not showing the error (as I said, I am pretty new to all of this)

 

I 2016.03.21 14:21:54 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.03.21 14:21:54 - Reading options from C:\Users\C E MOU\AppData\Local\AirVPN\AirVPN.xml
. 2016.03.21 14:21:54 - Data Path: C:\Users\C E MOU\AppData\Local\AirVPN
. 2016.03.21 14:21:54 - App Path: C:\Program Files\AirVPN
. 2016.03.21 14:21:54 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.03.21 14:21:54 - Command line arguments (1): path="home"
. 2016.03.21 14:21:54 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.03.21 14:21:54 - Updating systems & servers data ...
I 2016.03.21 14:21:54 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.03.21 14:21:54 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.03.21 14:21:54 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.03.21 14:21:54 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
W 2016.03.21 14:21:54 - Recovery. Unexpected crash?
I 2016.03.21 14:21:55 - IPv6 restored.
! 2016.03.21 14:21:55 - Ready
. 2016.03.21 14:21:56 - Systems & servers data update completed
I 2016.03.21 14:22:13 - Session starting.
F 2016.03.21 14:22:13 - OpenVPN is already running.
I 2016.03.21 14:22:24 - Session starting.
F 2016.03.21 14:22:24 - OpenVPN is already running.
I 2016.03.21 14:22:57 - Session starting.
I 2016.03.21 14:22:57 - IPv6 disabled.
I 2016.03.21 14:22:57 - Checking authorization ...
! 2016.03.21 14:22:58 - Connecting to Merope (United States, Los Angeles)
. 2016.03.21 14:22:58 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.21 14:22:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.21 14:22:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.21 14:22:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.21 14:22:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:22:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:22:58 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.03.21 14:22:58 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.21 14:22:58 - OpenVPN > UDPv4 link remote: [AF_INET]199.241.146.162:443
. 2016.03.21 14:22:59 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.146.162:443, sid=0adfa360 35ebeccc
. 2016.03.21 14:22:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.21 14:22:59 - OpenVPN > Validating certificate key usage
. 2016.03.21 14:22:59 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.03.21 14:22:59 - OpenVPN > VERIFY KU OK
. 2016.03.21 14:22:59 - OpenVPN > Validating certificate extended key usage
. 2016.03.21 14:22:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.21 14:22:59 - OpenVPN > VERIFY EKU OK
. 2016.03.21 14:22:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.21 14:23:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:23:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:23:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:23:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:23:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.21 14:23:00 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.146.162:443
. 2016.03.21 14:23:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.21 14:23:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.218 255.255.0.0'
. 2016.03.21 14:23:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.21 14:23:03 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.21 14:23:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.21 14:23:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.21 14:23:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.21 14:23:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.21 14:23:03 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.21 14:23:03 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.21 14:23:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE358293-CF7C-43BA-976D-8FFE93AA0DC5}.tap
. 2016.03.21 14:23:03 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.21 14:23:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.218/255.255.0.0 [sUCCEEDED]
. 2016.03.21 14:23:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.218/255.255.0.0 on interface {DE358293-CF7C-43BA-976D-8FFE93AA0DC5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.21 14:23:03 - OpenVPN > Successful ARP Flush on interface [19] {DE358293-CF7C-43BA-976D-8FFE93AA0DC5}
. 2016.03.21 14:23:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.21 14:23:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.241.146.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:23:08 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=8]
. 2016.03.21 14:23:08 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.03.21 14:23:08 - OpenVPN > Route addition fallback to route.exe
. 2016.03.21 14:23:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.03.21 14:23:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 8
. 2016.03.21 14:23:08 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=8]
. 2016.03.21 14:23:08 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.03.21 14:23:08 - OpenVPN > Route addition fallback to route.exe
. 2016.03.21 14:23:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.03.21 14:23:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:23:08 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=19]
. 2016.03.21 14:23:08 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.03.21 14:23:08 - OpenVPN > Route addition fallback to route.exe
. 2016.03.21 14:23:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.03.21 14:23:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:23:08 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=19]
. 2016.03.21 14:23:08 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.03.21 14:23:08 - OpenVPN > Route addition fallback to route.exe
. 2016.03.21 14:23:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.03.21 14:23:08 - Starting Management Interface
. 2016.03.21 14:23:08 - OpenVPN > Initialization Sequence Completed
I 2016.03.21 14:23:08 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:23:08 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.21 14:23:08 - Flushing DNS
I 2016.03.21 14:23:08 - Checking route
W 2016.03.21 14:23:32 - The remote name could not be resolved: 'merope_exit.airservers.org'
! 2016.03.21 14:23:32 - Disconnecting
. 2016.03.21 14:23:32 - Management - Send 'signal SIGTERM'
. 2016.03.21 14:23:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.21 14:23:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.21 14:23:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.21 14:23:32 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.03.21 14:23:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 199.241.146.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:23:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:23:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:23:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:23:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:37 - OpenVPN > Closing TUN/TAP interface
. 2016.03.21 14:23:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.21 14:23:37 - Connection terminated.
I 2016.03.21 14:23:37 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:23:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.21 14:23:40 - Checking authorization ...
! 2016.03.21 14:23:41 - Connecting to Merope (United States, Los Angeles)
. 2016.03.21 14:23:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.21 14:23:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.21 14:23:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.21 14:23:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.21 14:23:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:23:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:23:41 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.03.21 14:23:41 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.21 14:23:41 - OpenVPN > UDPv4 link remote: [AF_INET]199.241.146.162:443
. 2016.03.21 14:23:42 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.146.162:443, sid=63fbbce4 14bbc607
. 2016.03.21 14:23:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.21 14:23:42 - OpenVPN > Validating certificate key usage
. 2016.03.21 14:23:42 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.03.21 14:23:42 - OpenVPN > VERIFY KU OK
. 2016.03.21 14:23:42 - OpenVPN > Validating certificate extended key usage
. 2016.03.21 14:23:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.21 14:23:42 - OpenVPN > VERIFY EKU OK
. 2016.03.21 14:23:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.21 14:23:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:23:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:23:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:23:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:23:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.21 14:23:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.146.162:443
. 2016.03.21 14:23:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.21 14:23:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.218 255.255.0.0'
. 2016.03.21 14:23:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.21 14:23:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.21 14:23:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.21 14:23:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.21 14:23:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.21 14:23:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.21 14:23:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.21 14:23:46 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.21 14:23:46 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE358293-CF7C-43BA-976D-8FFE93AA0DC5}.tap
. 2016.03.21 14:23:46 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.21 14:23:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.218/255.255.0.0 [sUCCEEDED]
. 2016.03.21 14:23:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.218/255.255.0.0 on interface {DE358293-CF7C-43BA-976D-8FFE93AA0DC5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.21 14:23:46 - OpenVPN > Successful ARP Flush on interface [19] {DE358293-CF7C-43BA-976D-8FFE93AA0DC5}
. 2016.03.21 14:23:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.21 14:23:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.241.146.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:23:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:23:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 8
. 2016.03.21 14:23:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:23:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:23:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:23:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:23:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:23:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:23:51 - Starting Management Interface
. 2016.03.21 14:23:51 - OpenVPN > Initialization Sequence Completed
I 2016.03.21 14:23:51 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:23:51 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.21 14:23:51 - Flushing DNS
I 2016.03.21 14:23:52 - Checking route
W 2016.03.21 14:24:16 - The remote name could not be resolved: 'merope_exit.airservers.org'
! 2016.03.21 14:24:16 - Disconnecting
. 2016.03.21 14:24:16 - Management - Send 'signal SIGTERM'
. 2016.03.21 14:24:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.21 14:24:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.21 14:24:16 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.21 14:24:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 199.241.146.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:24:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:24:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:24:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:24:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:21 - OpenVPN > Closing TUN/TAP interface
. 2016.03.21 14:24:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.21 14:24:21 - Connection terminated.
I 2016.03.21 14:24:22 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:24:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.21 14:24:25 - Checking authorization ...
! 2016.03.21 14:24:26 - Connecting to Merope (United States, Los Angeles)
. 2016.03.21 14:24:26 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.21 14:24:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.21 14:24:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.21 14:24:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.21 14:24:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:24:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:24:26 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.03.21 14:24:26 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.21 14:24:26 - OpenVPN > UDPv4 link remote: [AF_INET]199.241.146.162:443
. 2016.03.21 14:24:26 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.146.162:443, sid=4fe01b23 6cb2bbac
. 2016.03.21 14:24:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.21 14:24:27 - OpenVPN > Validating certificate key usage
. 2016.03.21 14:24:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.03.21 14:24:27 - OpenVPN > VERIFY KU OK
. 2016.03.21 14:24:27 - OpenVPN > Validating certificate extended key usage
. 2016.03.21 14:24:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.21 14:24:27 - OpenVPN > VERIFY EKU OK
. 2016.03.21 14:24:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.21 14:24:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:24:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:24:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:24:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:24:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.21 14:24:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.146.162:443
. 2016.03.21 14:24:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.21 14:24:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.218 255.255.0.0'
. 2016.03.21 14:24:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.21 14:24:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.21 14:24:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.21 14:24:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.21 14:24:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.21 14:24:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.21 14:24:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.21 14:24:31 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.21 14:24:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE358293-CF7C-43BA-976D-8FFE93AA0DC5}.tap
. 2016.03.21 14:24:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.21 14:24:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.218/255.255.0.0 [sUCCEEDED]
. 2016.03.21 14:24:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.218/255.255.0.0 on interface {DE358293-CF7C-43BA-976D-8FFE93AA0DC5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.21 14:24:31 - OpenVPN > Successful ARP Flush on interface [19] {DE358293-CF7C-43BA-976D-8FFE93AA0DC5}
. 2016.03.21 14:24:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.21 14:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.241.146.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 8
. 2016.03.21 14:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:24:36 - Starting Management Interface
. 2016.03.21 14:24:36 - OpenVPN > Initialization Sequence Completed
I 2016.03.21 14:24:36 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:24:36 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.21 14:24:36 - Flushing DNS
I 2016.03.21 14:24:36 - Checking route
W 2016.03.21 14:25:00 - The remote name could not be resolved: 'merope_exit.airservers.org'
! 2016.03.21 14:25:00 - Disconnecting
. 2016.03.21 14:25:00 - Management - Send 'signal SIGTERM'
. 2016.03.21 14:25:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.21 14:25:00 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.21 14:25:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.21 14:25:00 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.03.21 14:25:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 199.241.146.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:25:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:25:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:25:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:25:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:05 - OpenVPN > Closing TUN/TAP interface
. 2016.03.21 14:25:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.21 14:25:05 - Connection terminated.
I 2016.03.21 14:25:05 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:25:05 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.21 14:25:08 - Checking authorization ...
! 2016.03.21 14:25:09 - Connecting to Persei (United States, Fremont, California)
. 2016.03.21 14:25:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.21 14:25:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.21 14:25:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.21 14:25:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.21 14:25:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:10 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.03.21 14:25:10 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.21 14:25:10 - OpenVPN > UDPv4 link remote: [AF_INET]94.100.23.162:443
. 2016.03.21 14:25:10 - OpenVPN > TLS: Initial packet from [AF_INET]94.100.23.162:443, sid=0242717a 7b6a6853
. 2016.03.21 14:25:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.21 14:25:10 - OpenVPN > Validating certificate key usage
. 2016.03.21 14:25:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.03.21 14:25:10 - OpenVPN > VERIFY KU OK
. 2016.03.21 14:25:10 - OpenVPN > Validating certificate extended key usage
. 2016.03.21 14:25:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.21 14:25:10 - OpenVPN > VERIFY EKU OK
. 2016.03.21 14:25:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.21 14:25:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:25:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:25:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.21 14:25:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]94.100.23.162:443
. 2016.03.21 14:25:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.21 14:25:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.73 255.255.0.0'
. 2016.03.21 14:25:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.21 14:25:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.21 14:25:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.21 14:25:15 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.21 14:25:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.21 14:25:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.21 14:25:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.21 14:25:15 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.21 14:25:15 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE358293-CF7C-43BA-976D-8FFE93AA0DC5}.tap
. 2016.03.21 14:25:15 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.21 14:25:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.73/255.255.0.0 [sUCCEEDED]
. 2016.03.21 14:25:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.73/255.255.0.0 on interface {DE358293-CF7C-43BA-976D-8FFE93AA0DC5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.21 14:25:15 - OpenVPN > Successful ARP Flush on interface [19] {DE358293-CF7C-43BA-976D-8FFE93AA0DC5}
. 2016.03.21 14:25:15 - Updating systems & servers data ...
. 2016.03.21 14:25:17 - Systems & servers data update completed
. 2016.03.21 14:25:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.21 14:25:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 94.100.23.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 8
. 2016.03.21 14:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:20 - Starting Management Interface
. 2016.03.21 14:25:20 - OpenVPN > Initialization Sequence Completed
I 2016.03.21 14:25:20 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:25:20 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.21 14:25:20 - Flushing DNS
I 2016.03.21 14:25:20 - Checking route
W 2016.03.21 14:25:44 - The remote name could not be resolved: 'persei_exit.airservers.org'
! 2016.03.21 14:25:44 - Disconnecting
. 2016.03.21 14:25:44 - Management - Send 'signal SIGTERM'
. 2016.03.21 14:25:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.21 14:25:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.21 14:25:44 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.21 14:25:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 94.100.23.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:25:49 - OpenVPN > Closing TUN/TAP interface
. 2016.03.21 14:25:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.21 14:25:49 - Connection terminated.
I 2016.03.21 14:25:49 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:25:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.21 14:25:52 - Checking authorization ...
! 2016.03.21 14:25:54 - Connecting to Persei (United States, Fremont, California)
. 2016.03.21 14:25:54 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.21 14:25:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.21 14:25:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.21 14:25:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.21 14:25:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:54 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.03.21 14:25:54 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.21 14:25:54 - OpenVPN > UDPv4 link remote: [AF_INET]94.100.23.162:443
. 2016.03.21 14:25:54 - OpenVPN > TLS: Initial packet from [AF_INET]94.100.23.162:443, sid=87e4f7a9 50ee26ba
. 2016.03.21 14:25:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.21 14:25:54 - OpenVPN > Validating certificate key usage
. 2016.03.21 14:25:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.03.21 14:25:54 - OpenVPN > VERIFY KU OK
. 2016.03.21 14:25:54 - OpenVPN > Validating certificate extended key usage
. 2016.03.21 14:25:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.21 14:25:54 - OpenVPN > VERIFY EKU OK
. 2016.03.21 14:25:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.21 14:25:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:25:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:25:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:25:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.21 14:25:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]94.100.23.162:443
. 2016.03.21 14:25:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.21 14:25:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.73 255.255.0.0'
. 2016.03.21 14:25:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.21 14:25:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.21 14:25:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.21 14:25:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.21 14:25:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.21 14:25:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.21 14:25:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.21 14:25:59 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.21 14:25:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE358293-CF7C-43BA-976D-8FFE93AA0DC5}.tap
. 2016.03.21 14:25:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.21 14:25:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.73/255.255.0.0 [sUCCEEDED]
. 2016.03.21 14:25:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.73/255.255.0.0 on interface {DE358293-CF7C-43BA-976D-8FFE93AA0DC5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.21 14:25:59 - OpenVPN > Successful ARP Flush on interface [19] {DE358293-CF7C-43BA-976D-8FFE93AA0DC5}
. 2016.03.21 14:26:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.21 14:26:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 94.100.23.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:26:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:26:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 8
. 2016.03.21 14:26:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:26:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:26:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:26:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:26:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:26:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:04 - Starting Management Interface
. 2016.03.21 14:26:04 - OpenVPN > Initialization Sequence Completed
I 2016.03.21 14:26:04 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:26:04 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.21 14:26:04 - Flushing DNS
I 2016.03.21 14:26:04 - Checking route
W 2016.03.21 14:26:28 - The remote name could not be resolved: 'persei_exit.airservers.org'
! 2016.03.21 14:26:28 - Disconnecting
. 2016.03.21 14:26:28 - Management - Send 'signal SIGTERM'
. 2016.03.21 14:26:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.21 14:26:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.21 14:26:28 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.21 14:26:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 94.100.23.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:26:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:26:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:26:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:26:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:33 - OpenVPN > Closing TUN/TAP interface
. 2016.03.21 14:26:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.21 14:26:34 - Connection terminated.
I 2016.03.21 14:26:34 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:26:34 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.21 14:26:37 - Cancel requested.
I 2016.03.21 14:26:37 - IPv6 restored.
! 2016.03.21 14:26:37 - Session terminated.
I 2016.03.21 14:26:46 - Session starting.
I 2016.03.21 14:26:46 - IPv6 disabled.
I 2016.03.21 14:26:46 - Checking authorization ...
! 2016.03.21 14:26:46 - Connecting to Yed (Hong Kong, Hong Kong)
. 2016.03.21 14:26:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.21 14:26:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.21 14:26:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.21 14:26:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.21 14:26:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:26:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:26:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.03.21 14:26:48 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.21 14:26:48 - OpenVPN > UDPv4 link remote: [AF_INET]103.16.27.74:443
. 2016.03.21 14:26:48 - OpenVPN > TLS: Initial packet from [AF_INET]103.16.27.74:443, sid=104c65e8 2e9df3fd
. 2016.03.21 14:26:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.21 14:26:48 - OpenVPN > Validating certificate key usage
. 2016.03.21 14:26:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.03.21 14:26:48 - OpenVPN > VERIFY KU OK
. 2016.03.21 14:26:48 - OpenVPN > Validating certificate extended key usage
. 2016.03.21 14:26:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.21 14:26:48 - OpenVPN > VERIFY EKU OK
. 2016.03.21 14:26:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.21 14:26:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:26:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:26:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:26:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:26:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.21 14:26:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]103.16.27.74:443
. 2016.03.21 14:26:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.21 14:26:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.187 255.255.0.0'
. 2016.03.21 14:26:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.21 14:26:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.21 14:26:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.21 14:26:51 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.21 14:26:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.21 14:26:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.21 14:26:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.21 14:26:51 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.21 14:26:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE358293-CF7C-43BA-976D-8FFE93AA0DC5}.tap
. 2016.03.21 14:26:51 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.21 14:26:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.187/255.255.0.0 [sUCCEEDED]
. 2016.03.21 14:26:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.187/255.255.0.0 on interface {DE358293-CF7C-43BA-976D-8FFE93AA0DC5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.21 14:26:51 - OpenVPN > Successful ARP Flush on interface [19] {DE358293-CF7C-43BA-976D-8FFE93AA0DC5}
. 2016.03.21 14:26:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.21 14:26:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 103.16.27.74 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:26:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:26:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 8
. 2016.03.21 14:26:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:26:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:26:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:26:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:26:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:26:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:26:56 - Starting Management Interface
. 2016.03.21 14:26:56 - OpenVPN > Initialization Sequence Completed
I 2016.03.21 14:26:56 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:26:56 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.21 14:26:56 - Flushing DNS
I 2016.03.21 14:26:56 - Checking route
W 2016.03.21 14:27:20 - The remote name could not be resolved: 'yed_exit.airservers.org'
! 2016.03.21 14:27:20 - Disconnecting
. 2016.03.21 14:27:20 - Management - Send 'signal SIGTERM'
. 2016.03.21 14:27:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.21 14:27:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.21 14:27:20 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.21 14:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 103.16.27.74 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:27:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:27:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:27:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:27:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:25 - OpenVPN > Closing TUN/TAP interface
. 2016.03.21 14:27:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.21 14:27:25 - Connection terminated.
I 2016.03.21 14:27:25 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:27:25 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.21 14:27:28 - Checking authorization ...
! 2016.03.21 14:27:29 - Connecting to Persei (United States, Fremont, California)
. 2016.03.21 14:27:29 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.03.21 14:27:29 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.03.21 14:27:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.03.21 14:27:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.03.21 14:27:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:27:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:27:29 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.03.21 14:27:29 - OpenVPN > UDPv4 link local: [undef]
. 2016.03.21 14:27:29 - OpenVPN > UDPv4 link remote: [AF_INET]94.100.23.162:443
. 2016.03.21 14:27:30 - OpenVPN > TLS: Initial packet from [AF_INET]94.100.23.162:443, sid=c3011579 24ae8111
. 2016.03.21 14:27:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.03.21 14:27:30 - OpenVPN > Validating certificate key usage
. 2016.03.21 14:27:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.03.21 14:27:30 - OpenVPN > VERIFY KU OK
. 2016.03.21 14:27:30 - OpenVPN > Validating certificate extended key usage
. 2016.03.21 14:27:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.03.21 14:27:30 - OpenVPN > VERIFY EKU OK
. 2016.03.21 14:27:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.03.21 14:27:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:27:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:27:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.03.21 14:27:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.03.21 14:27:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.03.21 14:27:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]94.100.23.162:443
. 2016.03.21 14:27:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.03.21 14:27:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.73 255.255.0.0'
. 2016.03.21 14:27:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.03.21 14:27:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.03.21 14:27:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.03.21 14:27:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.03.21 14:27:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.03.21 14:27:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.03.21 14:27:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.03.21 14:27:34 - OpenVPN > open_tun, tt->ipv6=0
. 2016.03.21 14:27:35 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE358293-CF7C-43BA-976D-8FFE93AA0DC5}.tap
. 2016.03.21 14:27:35 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.03.21 14:27:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.73/255.255.0.0 [sUCCEEDED]
. 2016.03.21 14:27:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.73/255.255.0.0 on interface {DE358293-CF7C-43BA-976D-8FFE93AA0DC5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.03.21 14:27:35 - OpenVPN > Successful ARP Flush on interface [19] {DE358293-CF7C-43BA-976D-8FFE93AA0DC5}
. 2016.03.21 14:27:40 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.03.21 14:27:40 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 94.100.23.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:27:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:27:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:40 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 8
. 2016.03.21 14:27:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.03.21 14:27:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:40 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:27:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:27:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:40 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:27:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.03.21 14:27:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.03.21 14:27:40 - Starting Management Interface
. 2016.03.21 14:27:40 - OpenVPN > Initialization Sequence Completed
I 2016.03.21 14:27:40 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:27:40 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.03.21 14:27:40 - Flushing DNS
I 2016.03.21 14:27:40 - Checking route
W 2016.03.21 14:28:04 - The remote name could not be resolved: 'persei_exit.airservers.org'
! 2016.03.21 14:28:04 - Disconnecting
. 2016.03.21 14:28:04 - Management - Send 'signal SIGTERM'
. 2016.03.21 14:28:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.03.21 14:28:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.03.21 14:28:04 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.03.21 14:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 94.100.23.162 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:28:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.03.21 14:28:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:28:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.03.21 14:28:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.03.21 14:28:10 - OpenVPN > Closing TUN/TAP interface
. 2016.03.21 14:28:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.03.21 14:28:10 - Connection terminated.
I 2016.03.21 14:28:10 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 7265)
I 2016.03.21 14:28:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.03.21 14:28:10 - Cancel requested.
I 2016.03.21 14:28:10 - IPv6 restored.
! 2016.03.21 14:28:10 - Session terminated.
 
Thanks

Share this post


Link to post
W 2016.03.21 14:21:54 - Recovery. Unexpected crash?
[...]
F 2016.03.21 14:22:13 - OpenVPN is already running.

Did you terminate the Eddie process before?

W 2016.03.21 14:27:20 - The remote name could not be resolved: 'yed_exit.airservers.org'

Such errors started to occur after some kind of update on Windows 10. As far as I know, there is no tangible solution, only approaches to it.

This error message occurs right after Eddie forces DNS settings. You could try disabling DNS forcing in Eddie. If it works, you could consider using some form of semi-automated script to use AirDNS again.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

 

W 2016.03.21 14:21:54 - Recovery. Unexpected crash?
[...]
F 2016.03.21 14:22:13 - OpenVPN is already running.

Did you terminate the Eddie process before?

W 2016.03.21 14:27:20 - The remote name could not be resolved: 'yed_exit.airservers.org'

Such errors started to occur after some kind of update on Windows 10. As far as I know, there is no tangible solution, only approaches to it.

This error message occurs right after Eddie forces DNS settings. You could try disabling DNS forcing in Eddie. If it works, you could consider using some form of semi-automated script to use AirDNS again.

 

 

Hello!

 

EDIT: everything in this message assumes that IPv6 does not come into play.

 

In various cases this issue is determined by an antivirus. In a minority of cases this is caused by an obscure Windows behavior (bug?) which deactivates DHCP on various network interfaces. In even less cases, the problem is caused by a DHCP client service crash (DHCP client service crashes are not uncommon in every Windows version).

 

Of course, all of the above crashes and obscure auto-modifications of system setup might just have two common (although opposite) underlying causes (an anti-malware, or a malware).

 

Sporadically, the problem is caused by some bug in the router firmware which interferes in the most bizarre ways with UDP. Again sporadically, the problem is caused by a packet inspection tool in the router.

 

Below you find our most exhaustive answer which solves the problem for Windows users 9 times out of 10.

 

 

Hello!

 

Please make sure that nothing (antivirus, firewall or other packet filtering tools, either on system or router) is interfering with OpenVPN.

 

After that, if the problem persists even after a system reboot, please restart the DHCP client service (while the Air client is NOT running) and try again. Please see here to stop and restart the DHCP client service:

 

http://computerstepbystep.com/dhcp_client_service.html

 

If the problem still persists, make sure that DHCP is enabled on card "Local Area Connection". Please open a command prompt with administrator privileges and issue the following command:

 

netsh interface ip set address name="Local Area Connection" source=dhcp

netsh interface ip set dnsserver name="Local Area Connection" source=dhcp

 

 

If the problem still persists, please follow this post (please make sure to check every and each point):

 

https://airvpn.org/topic/8320-solved-connects-but-ip-doesnt-change-on-windows-server-essentials-2012/?do=findComment&comment=8321

 

Kind regards

Share this post


Link to post

Hello.

Thank you for your post. It partially helped.

 

My problem was that after a windows 10 update airvpn stopped working (get the "The remote name could not be resolved" message)

When my comp. reboots and starts Airvpn it will now make a connection, but after that internet (webbrowsing) stops working.(not sure if the airvpn connection is still valid)

When i turn of the DHCP in windows and then back on. everything is fine.

The thing is i have to do this every time i turn on my computer.

 

Any idea what might cause this?

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...