Jump to content
Not connected, Your IP: 3.16.76.102
Sign in to follow this  
rui789

Keeps Disconnecting and restating

Recommended Posts

I'm on a mac. 

 

 

! 2016.04.01 16:01:50 - Disconnecting
. 2016.04.01 16:01:50 - Connection terminated.
I 2016.04.01 16:01:51 - Cancel requested.
I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth DUN)
I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Ethernet)
I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Wi-Fi)
I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth PAN)
I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Thunderbolt Bridge)
! 2016.04.01 16:01:51 - Session terminated.
I 2016.04.01 16:03:02 - Session starting.
I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Ethernet)
I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Wi-Fi)
I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth PAN)
I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2016.04.01 16:03:02 - Checking authorization ...
! 2016.04.01 16:03:03 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:03:03 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:03:03 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:03:03 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:03:03 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:03:03 - SSH > debug1: Connection established.
. 2016.04.01 16:03:03 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key type -1
. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key-cert type -1
. 2016.04.01 16:03:03 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:03:03 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:03:03 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:03:03 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:03:03 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:03:03 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:03:03 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:03:04 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:03:04 - SSH > debug1: checking without port identifier
. 2016.04.01 16:03:04 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:03:04 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:03:04 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:03:06 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:03:06 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:03:06 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key
. 2016.04.01 16:03:06 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:03:06 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:03:06 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:03:06 - SSH > debug1: Local connections to LOCALHOST:15677 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:03:06 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:03:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on ::1 port 15677.
. 2016.04.01 16:03:06 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 15677.
. 2016.04.01 16:03:06 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:03:06 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:03:06 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:03:06 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:03:06 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:03:06 - Disconnecting
. 2016.04.01 16:03:06 - Connection terminated.
I 2016.04.01 16:03:09 - Checking authorization ...
! 2016.04.01 16:03:10 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:03:10 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:03:10 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:03:10 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:03:10 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:03:10 - SSH > debug1: Connection established.
. 2016.04.01 16:03:10 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key type -1
. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key-cert type -1
. 2016.04.01 16:03:10 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:03:10 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:03:10 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:03:10 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:03:10 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:03:10 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:03:11 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:03:11 - SSH > debug1: checking without port identifier
. 2016.04.01 16:03:11 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:03:11 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:03:11 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:03:11 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:03:12 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:03:12 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:03:12 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key
. 2016.04.01 16:03:12 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:03:12 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:03:12 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:03:12 - SSH > debug1: Local connections to LOCALHOST:56237 forwarded to remote address 127.0.0.1:2018
! 2016.04.01 16:03:12 - Disconnecting
. 2016.04.01 16:03:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:03:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:03:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:03:12 - OpenVPN > Exiting due to fatal error
. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on ::1 port 56237.
. 2016.04.01 16:03:12 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56237.
. 2016.04.01 16:03:12 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:03:12 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:03:12 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:03:12 - Connection terminated.
I 2016.04.01 16:03:15 - Checking authorization ...
! 2016.04.01 16:03:16 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:03:16 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:03:16 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:03:16 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:03:16 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:03:16 - SSH > debug1: Connection established.
. 2016.04.01 16:03:16 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key type -1
. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key-cert type -1
. 2016.04.01 16:03:16 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:03:16 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:03:16 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:03:16 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:03:16 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:03:16 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:03:17 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:03:17 - SSH > debug1: checking without port identifier
. 2016.04.01 16:03:17 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:03:17 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:03:17 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:03:17 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:03:17 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:03:17 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:03:17 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key
. 2016.04.01 16:03:17 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:03:18 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:03:18 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:03:18 - SSH > debug1: Local connections to LOCALHOST:7656 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:03:18 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:03:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:03:18 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:03:18 - OpenVPN > Exiting due to fatal error
. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on ::1 port 7656.
! 2016.04.01 16:03:18 - Disconnecting
. 2016.04.01 16:03:18 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 7656.
. 2016.04.01 16:03:18 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:03:18 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:03:18 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:03:18 - Connection terminated.
I 2016.04.01 16:03:20 - Cancel requested.
I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth DUN)
I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Ethernet)
I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Wi-Fi)
I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth PAN)
I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Thunderbolt Bridge)
! 2016.04.01 16:03:20 - Session terminated.
I 2016.04.01 16:03:57 - Session starting.
I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Ethernet)
I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Wi-Fi)
I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth PAN)
I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2016.04.01 16:03:57 - Checking authorization ...
! 2016.04.01 16:03:57 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:03:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:03:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:03:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:03:58 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:03:58 - Disconnecting
. 2016.04.01 16:03:58 - Connection terminated.
I 2016.04.01 16:04:01 - Cancel requested.
I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth DUN)
I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Ethernet)
I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Wi-Fi)
I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth PAN)
I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Thunderbolt Bridge)
! 2016.04.01 16:04:01 - Session terminated.
I 2016.04.01 16:05:43 - Session starting.
I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Ethernet)
I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Wi-Fi)
I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth PAN)
I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2016.04.01 16:05:44 - Checking authorization ...
! 2016.04.01 16:05:44 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:05:44 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:05:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:05:44 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:05:44 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:05:44 - Disconnecting
. 2016.04.01 16:05:44 - Connection terminated.
I 2016.04.01 16:05:47 - Checking authorization ...
! 2016.04.01 16:05:47 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:05:47 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:05:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:05:47 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:05:47 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:05:48 - Disconnecting
. 2016.04.01 16:05:48 - Connection terminated.
I 2016.04.01 16:05:51 - Checking authorization ...
! 2016.04.01 16:05:51 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:05:51 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:05:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:05:51 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:05:51 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:05:51 - Disconnecting
. 2016.04.01 16:05:51 - Connection terminated.
I 2016.04.01 16:05:54 - Checking authorization ...
! 2016.04.01 16:05:54 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:05:54 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:05:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:05:54 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:05:54 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:05:54 - Disconnecting
. 2016.04.01 16:05:54 - Connection terminated.
I 2016.04.01 16:05:57 - Checking authorization ...
! 2016.04.01 16:05:58 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:05:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:05:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:05:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:05:58 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:05:58 - Disconnecting
. 2016.04.01 16:05:58 - Connection terminated.
I 2016.04.01 16:06:01 - Checking authorization ...
! 2016.04.01 16:06:01 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:01 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:01 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:01 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:01 - Disconnecting
. 2016.04.01 16:06:01 - Connection terminated.
I 2016.04.01 16:06:04 - Checking authorization ...
! 2016.04.01 16:06:05 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:05 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:05 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:05 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:05 - Disconnecting
. 2016.04.01 16:06:05 - Connection terminated.
I 2016.04.01 16:06:08 - Checking authorization ...
! 2016.04.01 16:06:08 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:08 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:08 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:08 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:08 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:08 - Disconnecting
. 2016.04.01 16:06:08 - Connection terminated.
I 2016.04.01 16:06:11 - Checking authorization ...
! 2016.04.01 16:06:12 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:12 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:12 - Disconnecting
. 2016.04.01 16:06:12 - Connection terminated.
I 2016.04.01 16:06:15 - Checking authorization ...
! 2016.04.01 16:06:15 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:15 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:15 - Disconnecting
. 2016.04.01 16:06:15 - Connection terminated.
I 2016.04.01 16:06:18 - Checking authorization ...
! 2016.04.01 16:06:19 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:19 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:19 - Disconnecting
. 2016.04.01 16:06:19 - Connection terminated.
I 2016.04.01 16:06:22 - Checking authorization ...
! 2016.04.01 16:06:22 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:22 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:22 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:22 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:22 - Disconnecting
. 2016.04.01 16:06:22 - Connection terminated.
I 2016.04.01 16:06:25 - Checking authorization ...
I 2016.04.01 16:06:26 - Cancel requested.
I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth DUN)
I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Ethernet)
I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Wi-Fi)
I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth PAN)
I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Thunderbolt Bridge)
! 2016.04.01 16:06:26 - Session terminated.
I 2016.04.01 16:06:27 - Session starting.
I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Ethernet)
I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Wi-Fi)
I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth PAN)
I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2016.04.01 16:06:27 - Checking authorization ...
! 2016.04.01 16:06:28 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:28 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:28 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:28 - Disconnecting
. 2016.04.01 16:06:28 - Connection terminated.
I 2016.04.01 16:06:31 - Checking authorization ...
! 2016.04.01 16:06:32 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:32 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:32 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:32 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:32 - Disconnecting
. 2016.04.01 16:06:32 - Connection terminated.
I 2016.04.01 16:06:35 - Checking authorization ...
! 2016.04.01 16:06:35 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:35 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:35 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:35 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:35 - Disconnecting
. 2016.04.01 16:06:35 - Connection terminated.
I 2016.04.01 16:06:38 - Checking authorization ...
! 2016.04.01 16:06:38 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:38 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:38 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:38 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:38 - Disconnecting
. 2016.04.01 16:06:38 - Connection terminated.
I 2016.04.01 16:06:41 - Checking authorization ...
! 2016.04.01 16:06:42 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:42 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:42 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:42 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:42 - Disconnecting
. 2016.04.01 16:06:42 - Connection terminated.
I 2016.04.01 16:06:45 - Checking authorization ...
! 2016.04.01 16:06:45 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:06:45 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:06:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:06:45 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:06:45 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:06:45 - Disconnecting
. 2016.04.01 16:06:45 - Connection terminated.
I 2016.04.01 16:06:47 - Cancel requested.
I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth DUN)
I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Ethernet)
I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Wi-Fi)
I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth PAN)
I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Thunderbolt Bridge)
! 2016.04.01 16:06:48 - Session terminated.
I 2016.04.01 16:07:10 - Session starting.
I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Ethernet)
I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Wi-Fi)
I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth PAN)
I 2016.04.01 16:07:11 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2016.04.01 16:07:11 - Checking authorization ...
! 2016.04.01 16:07:11 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:11 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:11 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:11 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:11 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:11 - SSH > debug1: Connection established.
. 2016.04.01 16:07:11 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key type -1
. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key-cert type -1
. 2016.04.01 16:07:11 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:11 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:11 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:11 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:11 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:12 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:12 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:12 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:12 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:12 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:12 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:12 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:13 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:13 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:13 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:13 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key
. 2016.04.01 16:07:13 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:13 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:13 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:13 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:13 - SSH > debug1: Local connections to LOCALHOST:24160 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on ::1 port 24160.
. 2016.04.01 16:07:13 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:13 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:13 - OpenVPN > Exiting due to fatal error
. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 24160.
. 2016.04.01 16:07:13 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:13 - SSH > debug1: Requesting no-more-sessions@openssh.com
! 2016.04.01 16:07:13 - Disconnecting
. 2016.04.01 16:07:13 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:13 - Connection terminated.
I 2016.04.01 16:07:16 - Checking authorization ...
! 2016.04.01 16:07:17 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:17 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:17 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:17 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:17 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:17 - SSH > debug1: Connection established.
. 2016.04.01 16:07:17 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key type -1
. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key-cert type -1
. 2016.04.01 16:07:17 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:17 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:18 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:18 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:18 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:18 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:18 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:18 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:18 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:18 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:18 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:19 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:19 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:19 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:19 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key
. 2016.04.01 16:07:19 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:19 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:19 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:19 - SSH > debug1: Local connections to LOCALHOST:2570 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on ::1 port 2570.
. 2016.04.01 16:07:19 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2570.
. 2016.04.01 16:07:19 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:19 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:19 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:19 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:19 - Disconnecting
. 2016.04.01 16:07:19 - Connection terminated.
I 2016.04.01 16:07:22 - Checking authorization ...
! 2016.04.01 16:07:23 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:23 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:23 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:23 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:23 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:23 - SSH > debug1: Connection established.
. 2016.04.01 16:07:23 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key type -1
. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key-cert type -1
. 2016.04.01 16:07:23 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:23 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:24 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:24 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:24 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:24 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:24 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:25 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:25 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:25 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key
. 2016.04.01 16:07:25 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:25 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:25 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:25 - SSH > debug1: Local connections to LOCALHOST:22654 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on ::1 port 22654.
. 2016.04.01 16:07:25 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 22654.
. 2016.04.01 16:07:25 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:25 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:25 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:25 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:25 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:25 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:25 - Disconnecting
. 2016.04.01 16:07:25 - Connection terminated.
I 2016.04.01 16:07:28 - Checking authorization ...
! 2016.04.01 16:07:28 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:28 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:28 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:28 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:28 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:28 - SSH > debug1: Connection established.
. 2016.04.01 16:07:28 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key type -1
. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key-cert type -1
. 2016.04.01 16:07:28 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:28 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:29 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:29 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:29 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:29 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:29 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:29 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:29 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:29 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:29 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:30 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:30 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:30 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:30 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key
. 2016.04.01 16:07:30 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:30 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:30 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:30 - SSH > debug1: Local connections to LOCALHOST:2708 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:30 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on ::1 port 2708.
. 2016.04.01 16:07:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:30 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2708.
. 2016.04.01 16:07:30 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:30 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:30 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:30 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:30 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:30 - Disconnecting
. 2016.04.01 16:07:30 - Connection terminated.
I 2016.04.01 16:07:34 - Checking authorization ...
! 2016.04.01 16:07:34 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:34 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:34 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:34 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:34 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:34 - SSH > debug1: Connection established.
. 2016.04.01 16:07:34 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key type -1
. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key-cert type -1
. 2016.04.01 16:07:34 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:34 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:34 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:34 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:34 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:34 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:34 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:35 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:35 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:35 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:35 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:35 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:35 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:35 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:35 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key
. 2016.04.01 16:07:35 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:36 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:36 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:36 - SSH > debug1: Local connections to LOCALHOST:28938 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on ::1 port 28938.
. 2016.04.01 16:07:36 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 28938.
. 2016.04.01 16:07:36 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:36 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:36 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:36 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:36 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:36 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:36 - Disconnecting
. 2016.04.01 16:07:36 - Connection terminated.
I 2016.04.01 16:07:39 - Checking authorization ...
! 2016.04.01 16:07:39 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:39 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:39 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:39 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:39 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:39 - SSH > debug1: Connection established.
. 2016.04.01 16:07:39 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key type -1
. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key-cert type -1
. 2016.04.01 16:07:39 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:39 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:39 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:39 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:39 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:40 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:40 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:40 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:40 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:40 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:40 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:40 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:41 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:41 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:41 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:41 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key
. 2016.04.01 16:07:41 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:41 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:41 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:41 - SSH > debug1: Local connections to LOCALHOST:13284 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on ::1 port 13284.
. 2016.04.01 16:07:41 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 13284.
. 2016.04.01 16:07:41 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:41 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:41 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:41 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:41 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:41 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:41 - Disconnecting
. 2016.04.01 16:07:41 - Connection terminated.
I 2016.04.01 16:07:44 - Checking authorization ...
! 2016.04.01 16:07:44 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:45 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:45 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:45 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:45 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:45 - SSH > debug1: Connection established.
. 2016.04.01 16:07:45 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key type -1
. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key-cert type -1
. 2016.04.01 16:07:45 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:45 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:45 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:45 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:45 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:45 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:46 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:46 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:46 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:46 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:46 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:46 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:46 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:46 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:46 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key
. 2016.04.01 16:07:46 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:46 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:46 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:46 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:46 - SSH > debug1: Local connections to LOCALHOST:17898 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on ::1 port 17898.
. 2016.04.01 16:07:46 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 17898.
. 2016.04.01 16:07:46 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:46 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:46 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:46 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:46 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:46 - Disconnecting
. 2016.04.01 16:07:47 - Connection terminated.
I 2016.04.01 16:07:50 - Checking authorization ...
! 2016.04.01 16:07:50 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:50 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:50 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:50 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:50 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:50 - SSH > debug1: Connection established.
. 2016.04.01 16:07:50 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key type -1
. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key-cert type -1
. 2016.04.01 16:07:50 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:50 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:50 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:50 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:50 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:51 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:51 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:51 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:51 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:51 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:51 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:51 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:52 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:52 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:52 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key
. 2016.04.01 16:07:52 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:52 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:52 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:52 - SSH > debug1: Local connections to LOCALHOST:56837 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on ::1 port 56837.
. 2016.04.01 16:07:52 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56837.
. 2016.04.01 16:07:52 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:52 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:52 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:52 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:52 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:52 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:52 - Disconnecting
. 2016.04.01 16:07:52 - Connection terminated.
I 2016.04.01 16:07:55 - Checking authorization ...
! 2016.04.01 16:07:55 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:07:55 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:07:55 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:07:55 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:07:55 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:07:55 - SSH > debug1: Connection established.
. 2016.04.01 16:07:55 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key type -1
. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key-cert type -1
. 2016.04.01 16:07:55 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:07:55 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:07:56 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:07:56 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:07:56 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:56 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:07:56 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:07:56 - SSH > debug1: checking without port identifier
. 2016.04.01 16:07:56 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:07:56 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:07:56 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:07:57 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:07:57 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:07:57 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:07:57 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key
. 2016.04.01 16:07:57 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:07:57 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:07:57 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:07:57 - SSH > debug1: Local connections to LOCALHOST:25992 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on ::1 port 25992.
. 2016.04.01 16:07:57 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 25992.
. 2016.04.01 16:07:57 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:07:57 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:07:57 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:07:57 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:07:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:07:57 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:07:57 - OpenVPN > Exiting due to fatal error
! 2016.04.01 16:07:57 - Disconnecting
. 2016.04.01 16:07:57 - Connection terminated.
I 2016.04.01 16:08:00 - Checking authorization ...
! 2016.04.01 16:08:01 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:08:01 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:08:01 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:08:01 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:08:01 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:09:08 - SSH > debug1: Connection established.
. 2016.04.01 16:09:08 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key type -1
. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key-cert type -1
. 2016.04.01 16:09:08 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:09:08 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:09:08 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:09:08 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:09:08 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:09:08 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:09:09 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:09:09 - SSH > debug1: checking without port identifier
. 2016.04.01 16:09:09 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:09:09 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:09:09 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:09:09 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:09:09 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:09:09 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:09:09 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key
. 2016.04.01 16:09:09 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:09:09 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:09:10 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:09:10 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:09:10 - SSH > debug1: Local connections to LOCALHOST:9956 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:09:10 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on ::1 port 9956.
. 2016.04.01 16:09:10 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:09:10 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:09:10 - OpenVPN > Exiting due to fatal error
. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 9956.
. 2016.04.01 16:09:10 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:09:10 - SSH > debug1: Requesting no-more-sessions@openssh.com
! 2016.04.01 16:09:10 - Disconnecting
. 2016.04.01 16:09:10 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:09:10 - Connection terminated.
I 2016.04.01 16:09:13 - Checking authorization ...
! 2016.04.01 16:09:13 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:09:13 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:09:13 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:09:13 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:09:13 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:09:13 - SSH > debug1: Connection established.
. 2016.04.01 16:09:13 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key type -1
. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key-cert type -1
. 2016.04.01 16:09:13 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:09:13 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:09:13 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:09:13 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:09:14 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:09:14 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:09:14 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:09:14 - SSH > debug1: checking without port identifier
. 2016.04.01 16:09:14 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:09:14 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:09:14 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:09:15 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:09:15 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:09:15 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:09:15 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key
. 2016.04.01 16:09:15 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:09:15 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:09:15 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:09:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:09:15 - SSH > debug1: Local connections to LOCALHOST:34435 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:09:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on ::1 port 34435.
. 2016.04.01 16:09:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:09:15 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:09:15 - OpenVPN > Exiting due to fatal error
. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 34435.
. 2016.04.01 16:09:15 - SSH > debug1: channel 1: new [port listener]
! 2016.04.01 16:09:15 - Disconnecting
. 2016.04.01 16:09:15 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:09:15 - SSH > debug1: Entering interactive session.
. 2016.04.01 16:09:15 - Connection terminated.
I 2016.04.01 16:09:18 - Checking authorization ...
I 2016.04.01 16:09:19 - Cancel requested.
I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth DUN)
I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Ethernet)
I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Wi-Fi)
I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth PAN)
I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Thunderbolt Bridge)
! 2016.04.01 16:09:19 - Session terminated.
I 2016.04.01 16:09:21 - Session starting.
I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Ethernet)
I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Wi-Fi)
I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth PAN)
I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2016.04.01 16:09:22 - Checking authorization ...
! 2016.04.01 16:09:22 - Connecting to Kleeia (Canada, Vancouver)
. 2016.04.01 16:09:22 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2016.04.01 16:09:22 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2016.04.01 16:09:22 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2016.04.01 16:09:22 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.
. 2016.04.01 16:09:22 - SSH > debug1: Connection established.
. 2016.04.01 16:09:22 - SSH > debug1: permanently_set_uid: 501/20
. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key type -1
. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key-cert type -1
. 2016.04.01 16:09:22 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.01 16:09:22 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2016.04.01 16:09:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.01 16:09:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*
. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.01 16:09:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:09:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2016.04.01 16:09:23 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34
. 2016.04.01 16:09:23 - SSH > debug1: checking without port identifier
. 2016.04.01 16:09:23 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.
. 2016.04.01 16:09:23 - SSH > debug1: ssh_rsa_verify: signature correct
. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.01 16:09:23 - SSH > debug1: Roaming not allowed by server
. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.01 16:09:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.01 16:09:24 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.01 16:09:24 - SSH > debug1: Next authentication method: publickey
. 2016.04.01 16:09:24 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key
. 2016.04.01 16:09:24 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.01 16:09:24 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.01 16:09:24 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).
. 2016.04.01 16:09:24 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015
. 2016.04.01 16:09:24 - SSH > debug1: Local connections to LOCALHOST:40961 forwarded to remote address 127.0.0.1:2018
. 2016.04.01 16:09:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on ::1 port 40961.
. 2016.04.01 16:09:24 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:09:24 - SSH > debug1: channel 0: new [port listener]
. 2016.04.01 16:09:24 - OpenVPN > Exiting due to fatal error
. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 40961.
. 2016.04.01 16:09:24 - SSH > debug1: channel 1: new [port listener]
. 2016.04.01 16:09:24 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.01 16:09:24 - SSH > debug1: Entering interactive session.
! 2016.04.01 16:09:24 - Disconnecting
. 2016.04.01 16:09:24 - Connection terminated.
 

Share this post


Link to post

You can try without the SSH tunnel and this should work.

The issue is that your system cannot resolve localhost to 127.0.0.1 and this causes OpenVPN to fail:

 

. 2016.04.01 16:03:06 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known
. 2016.04.01 16:03:06 - OpenVPN > Exiting due to fatal error
 
 
Can you paste the contents of your /etc/hosts ?

Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

Hello !

 

You need one thing in your life and it's spoilers. No, no, not for your movies, but for your posts. Check my signature for how to do it: it'll help us help you, if you use a

tag.

Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I have a feeling an old instance of airvpn is still running in the background. Quit AirVPN then Open Activity Monitor. Search for openvpn. If it's running quit it. Now relaunch AirVPN and you should be good to go. Alternatively, you could just restart your computer (assuming this is the problem).

Share this post


Link to post

I'm new to this so forgive me if I'm not following proper protocol.  

 

I thought I had all this set up and working but have noticed that every now and then it disconnects.  really not sure what to do to rectify this.  Any suggestions would be more than welcome. An example in the  Log below shows disconnecting at 22.04

 

. 2016.05.03 15:55:15 - OpenVPN > VERIFY KU OK
. 2016.05.03 15:55:15 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 15:55:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 15:55:15 - OpenVPN > VERIFY EKU OK
. 2016.05.03 15:55:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:55:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 15:55:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 15:55:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 15:55:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 15:55:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 15:55:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 15:55:21 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 15:55:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 15:55:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 15:55:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 15:55:21 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 15:55:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - Starting Management Interface
. 2016.05.03 15:55:26 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 15:55:26 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:55:26 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 15:55:26 - Flushing DNS
I 2016.05.03 15:55:26 - Checking route
I 2016.05.03 15:55:50 - Checking DNS
! 2016.05.03 15:55:50 - Connected.
. 2016.05.03 15:55:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 15:55:51 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 15:55:51 - Disconnecting
. 2016.05.03 15:55:51 - Management - Send 'signal SIGTERM'
. 2016.05.03 15:55:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 15:55:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 15:55:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 15:55:57 - Connection terminated.
I 2016.05.03 15:55:57 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:55:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 15:55:57 - IPv6 restored.
! 2016.05.03 15:55:57 - Session terminated.
I 2016.05.03 15:56:29 - Session starting.
I 2016.05.03 15:56:29 - IPv6 disabled.
I 2016.05.03 15:56:29 - Checking authorization ...
! 2016.05.03 15:56:30 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 15:56:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 15:56:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 15:56:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 15:56:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 15:56:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 15:56:30 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 15:56:30 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 15:56:30 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=d2bcc9a6 8a7df192
. 2016.05.03 15:56:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 15:56:30 - OpenVPN > Validating certificate key usage
. 2016.05.03 15:56:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 15:56:30 - OpenVPN > VERIFY KU OK
. 2016.05.03 15:56:30 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 15:56:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 15:56:30 - OpenVPN > VERIFY EKU OK
. 2016.05.03 15:56:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 15:56:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 15:56:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 15:56:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 15:56:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 15:56:32 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 15:56:32 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 15:56:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 15:56:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 15:56:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 15:56:32 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 15:56:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - Starting Management Interface
. 2016.05.03 15:56:37 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 15:56:37 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:56:37 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 15:56:37 - Flushing DNS
I 2016.05.03 15:56:37 - Checking route
I 2016.05.03 15:56:49 - Checking DNS
! 2016.05.03 15:57:01 - Connected.
. 2016.05.03 15:57:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 15:57:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 15:58:38 - Disconnecting
. 2016.05.03 15:58:38 - Management - Send 'signal SIGTERM'
. 2016.05.03 15:58:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 15:58:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 15:58:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 15:58:43 - Connection terminated.
I 2016.05.03 15:58:43 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:58:43 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 15:58:43 - IPv6 restored.
! 2016.05.03 15:58:44 - Session terminated.
. 2016.05.03 15:59:44 - Updating systems & servers data ...
. 2016.05.03 15:59:44 - Systems & servers data update completed
I 2016.05.03 16:00:42 - Session starting.
I 2016.05.03 16:00:42 - IPv6 disabled.
I 2016.05.03 16:00:42 - Checking authorization ...
! 2016.05.03 16:00:43 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 16:00:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 16:00:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 16:00:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 16:00:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 16:00:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:43 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 16:00:43 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 16:00:43 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 16:00:43 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=7e5bbec0 a7f17d45
. 2016.05.03 16:00:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 16:00:43 - OpenVPN > Validating certificate key usage
. 2016.05.03 16:00:43 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 16:00:43 - OpenVPN > VERIFY KU OK
. 2016.05.03 16:00:43 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 16:00:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 16:00:43 - OpenVPN > VERIFY EKU OK
. 2016.05.03 16:00:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 16:00:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 16:00:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 16:00:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 16:00:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 16:00:46 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 16:00:46 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 16:00:46 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 16:00:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 16:00:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 16:00:46 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 16:00:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - Starting Management Interface
. 2016.05.03 16:00:51 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 16:00:51 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 16:00:51 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 16:00:51 - Flushing DNS
I 2016.05.03 16:00:51 - Checking route
I 2016.05.03 16:01:16 - Checking DNS
! 2016.05.03 16:01:16 - Connected.
. 2016.05.03 16:01:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 16:01:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 16:09:28 - Disconnecting
. 2016.05.03 16:09:28 - Management - Send 'signal SIGTERM'
. 2016.05.03 16:09:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 16:09:28 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 16:09:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 16:09:33 - Connection terminated.
I 2016.05.03 16:09:33 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 16:09:33 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 16:09:33 - IPv6 restored.
! 2016.05.03 16:09:33 - Session terminated.
I 2016.05.03 16:09:38 - Session starting.
I 2016.05.03 16:09:38 - IPv6 disabled.
I 2016.05.03 16:09:38 - Checking authorization ...
! 2016.05.03 16:09:39 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 16:09:39 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 16:09:39 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 16:09:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 16:09:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 16:09:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 16:09:39 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 16:09:39 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 16:09:39 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=4800b0f7 83033432
. 2016.05.03 16:09:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 16:09:39 - OpenVPN > Validating certificate key usage
. 2016.05.03 16:09:39 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 16:09:39 - OpenVPN > VERIFY KU OK
. 2016.05.03 16:09:39 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 16:09:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 16:09:39 - OpenVPN > VERIFY EKU OK
. 2016.05.03 16:09:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 16:09:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 16:09:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 16:09:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 16:09:42 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 16:09:42 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 16:09:42 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 16:09:42 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 16:09:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 16:09:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 16:09:42 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 16:09:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - Starting Management Interface
. 2016.05.03 16:09:47 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 16:09:47 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 16:09:48 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 16:09:48 - Flushing DNS
I 2016.05.03 16:09:48 - Checking route
I 2016.05.03 16:10:12 - Checking DNS
! 2016.05.03 16:10:12 - Connected.
. 2016.05.03 16:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 16:10:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 16:29:55 - Updating systems & servers data ...
. 2016.05.03 16:29:55 - Systems & servers data update completed
. 2016.05.03 16:43:48 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 16:43:48 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 16:43:48 - OpenVPN > Exiting due to fatal error
. 2016.05.03 16:43:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 16:43:48 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 16:43:48 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 16:43:48 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.05.03 16:43:48 - Disconnecting
. 2016.05.03 16:43:48 - Management - Send 'signal SIGTERM'
. 2016.05.03 16:43:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 16:43:48 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 16:43:48 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 16:43:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:43:49 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 16:43:49 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 16:43:49 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 16:43:49 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 17:09:50 - Management - Send 'signal SIGTERM'
W 2016.05.03 17:09:50 - An established connection was aborted by the software in your host machine
. 2016.05.03 17:09:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:09:50 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 17:09:50 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 17:09:50 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 17:09:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 17:09:50 - OpenVPN > Closing TUN/TAP interface
W 2016.05.03 17:09:54 - Access is denied
. 2016.05.03 17:09:54 - Connection terminated.
I 2016.05.03 17:09:54 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:09:54 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 17:09:58 - Checking authorization ...
! 2016.05.03 17:09:59 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 17:09:59 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 17:09:59 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 17:09:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 17:09:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 17:09:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:09:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:09:59 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 17:09:59 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 17:09:59 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 17:09:59 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=f25655af d02bdd45
. 2016.05.03 17:09:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 17:09:59 - OpenVPN > Validating certificate key usage
. 2016.05.03 17:09:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 17:09:59 - OpenVPN > VERIFY KU OK
. 2016.05.03 17:09:59 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 17:09:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 17:09:59 - OpenVPN > VERIFY EKU OK
. 2016.05.03 17:09:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 17:10:00 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 17:10:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 17:10:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 17:10:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 17:10:02 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 17:10:02 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 17:10:02 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 17:10:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 17:10:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 17:10:02 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 17:10:05 - Updating systems & servers data ...
. 2016.05.03 17:10:06 - Systems & servers data update completed
. 2016.05.03 17:10:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - Starting Management Interface
. 2016.05.03 17:10:07 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 17:10:07 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:10:07 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 17:10:07 - Flushing DNS
I 2016.05.03 17:10:07 - Checking route
I 2016.05.03 17:10:32 - Checking DNS
! 2016.05.03 17:10:32 - Connected.
. 2016.05.03 17:10:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 17:10:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 17:10:36 - Disconnecting
. 2016.05.03 17:10:36 - Management - Send 'signal SIGTERM'
. 2016.05.03 17:10:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 17:10:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 17:10:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 17:10:41 - Connection terminated.
I 2016.05.03 17:10:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:10:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 17:10:41 - IPv6 restored.
! 2016.05.03 17:10:41 - Session terminated.
I 2016.05.03 17:10:58 - Session starting.
I 2016.05.03 17:10:58 - IPv6 disabled.
I 2016.05.03 17:10:58 - Checking authorization ...
! 2016.05.03 17:10:58 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 17:10:58 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 17:10:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 17:10:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 17:10:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 17:10:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:58 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 17:10:58 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 17:10:58 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 17:10:58 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=0a7cd7ea 2ef496d3
. 2016.05.03 17:11:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 17:11:04 - OpenVPN > Validating certificate key usage
. 2016.05.03 17:11:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 17:11:04 - OpenVPN > VERIFY KU OK
. 2016.05.03 17:11:04 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 17:11:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 17:11:04 - OpenVPN > VERIFY EKU OK
. 2016.05.03 17:11:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 17:11:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 17:11:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 17:11:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 17:11:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 17:11:08 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 17:11:08 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 17:11:08 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 17:11:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 17:11:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 17:11:08 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 17:11:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - Starting Management Interface
. 2016.05.03 17:11:13 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 17:11:13 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:11:13 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 17:11:13 - Flushing DNS
I 2016.05.03 17:11:13 - Checking route
I 2016.05.03 17:11:25 - Checking DNS
! 2016.05.03 17:11:38 - Connected.
. 2016.05.03 17:11:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 17:11:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.05.03 17:11:50 - Disconnecting
. 2016.05.03 17:11:50 - Management - Send 'signal SIGTERM'
. 2016.05.03 17:11:50 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 17:11:50 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 17:11:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 17:11:56 - Connection terminated.
I 2016.05.03 17:11:56 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:11:56 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 17:11:59 - Checking authorization ...
! 2016.05.03 17:11:59 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 17:11:59 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 17:11:59 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 17:11:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 17:11:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 17:11:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:59 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 17:11:59 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 17:11:59 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 17:11:59 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=49318a64 6ce59a9b
. 2016.05.03 17:11:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 17:11:59 - OpenVPN > Validating certificate key usage
. 2016.05.03 17:11:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 17:11:59 - OpenVPN > VERIFY KU OK
. 2016.05.03 17:11:59 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 17:11:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 17:11:59 - OpenVPN > VERIFY EKU OK
. 2016.05.03 17:11:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:12:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 17:12:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 17:12:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 17:12:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 17:12:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 17:12:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 17:12:05 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 17:12:05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 17:12:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 17:12:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 17:12:05 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 17:12:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - Starting Management Interface
. 2016.05.03 17:12:10 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 17:12:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:12:10 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 17:12:10 - Flushing DNS
I 2016.05.03 17:12:10 - Checking route
I 2016.05.03 17:12:34 - Checking DNS
! 2016.05.03 17:12:46 - Connected.
. 2016.05.03 17:12:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 17:12:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 17:40:16 - Updating systems & servers data ...
. 2016.05.03 17:40:17 - Systems & servers data update completed
. 2016.05.03 18:10:26 - Updating systems & servers data ...
. 2016.05.03 18:10:26 - Systems & servers data update completed
. 2016.05.03 18:12:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 18:12:03 - OpenVPN > Validating certificate key usage
. 2016.05.03 18:12:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 18:12:03 - OpenVPN > VERIFY KU OK
. 2016.05.03 18:12:03 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 18:12:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 18:12:03 - OpenVPN > VERIFY EKU OK
. 2016.05.03 18:12:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 18:12:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 18:40:37 - Updating systems & servers data ...
. 2016.05.03 18:40:37 - Systems & servers data update completed
. 2016.05.03 19:10:48 - Updating systems & servers data ...
. 2016.05.03 19:10:48 - Systems & servers data update completed
I 2016.05.03 19:12:03 - Renewing TLS key
. 2016.05.03 19:12:03 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.05.03 19:12:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 19:12:05 - OpenVPN > Validating certificate key usage
. 2016.05.03 19:12:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 19:12:05 - OpenVPN > VERIFY KU OK
. 2016.05.03 19:12:05 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 19:12:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 19:12:05 - OpenVPN > VERIFY EKU OK
. 2016.05.03 19:12:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 19:12:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 19:40:59 - Updating systems & servers data ...
. 2016.05.03 19:41:00 - Systems & servers data update completed
. 2016.05.03 20:11:10 - Updating systems & servers data ...
. 2016.05.03 20:11:11 - Systems & servers data update completed
I 2016.05.03 20:12:05 - Renewing TLS key
. 2016.05.03 20:12:05 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.05.03 20:12:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 20:12:05 - OpenVPN > Validating certificate key usage
. 2016.05.03 20:12:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 20:12:05 - OpenVPN > VERIFY KU OK
. 2016.05.03 20:12:05 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 20:12:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 20:12:05 - OpenVPN > VERIFY EKU OK
. 2016.05.03 20:12:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:12:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 20:33:18 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 20:33:18 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 20:33:18 - OpenVPN > Exiting due to fatal error
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 20:33:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 20:33:18 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.05.03 20:33:18 - Disconnecting
. 2016.05.03 20:33:18 - Management - Send 'signal SIGTERM'
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 20:33:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 20:33:19 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 20:38:48 - Connection terminated.
I 2016.05.03 20:38:49 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 20:38:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 20:39:01 - Checking authorization ...
! 2016.05.03 20:39:01 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 20:39:01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 20:39:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 20:39:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 20:39:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 20:39:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 20:39:01 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 20:39:01 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 20:39:01 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=d50c427c 1f0e5175
. 2016.05.03 20:39:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 20:39:01 - OpenVPN > Validating certificate key usage
. 2016.05.03 20:39:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 20:39:01 - OpenVPN > VERIFY KU OK
. 2016.05.03 20:39:01 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 20:39:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 20:39:01 - OpenVPN > VERIFY EKU OK
. 2016.05.03 20:39:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 20:39:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 20:39:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 20:39:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 20:39:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 20:39:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 20:39:05 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 20:39:05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 20:39:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 20:39:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 20:39:05 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 20:39:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - Starting Management Interface
. 2016.05.03 20:39:10 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 20:39:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 20:39:10 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 20:39:10 - Flushing DNS
I 2016.05.03 20:39:10 - Checking route
I 2016.05.03 20:39:23 - Checking DNS
! 2016.05.03 20:39:23 - Connected.
. 2016.05.03 20:39:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 20:39:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 20:41:48 - Updating systems & servers data ...
. 2016.05.03 20:41:49 - Systems & servers data update completed
. 2016.05.03 21:12:00 - Updating systems & servers data ...
. 2016.05.03 21:12:01 - Systems & servers data update completed
. 2016.05.03 21:39:02 - OpenVPN > TLS: soft reset sec=0 bytes=11874878/0 pkts=22676/0
. 2016.05.03 21:39:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 21:39:03 - OpenVPN > Validating certificate key usage
. 2016.05.03 21:39:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 21:39:03 - OpenVPN > VERIFY KU OK
. 2016.05.03 21:39:03 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 21:39:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 21:39:03 - OpenVPN > VERIFY EKU OK
. 2016.05.03 21:39:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 21:39:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 21:42:13 - Updating systems & servers data ...
. 2016.05.03 21:42:14 - Systems & servers data update completed
. 2016.05.03 22:04:17 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 22:04:17 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 22:04:17 - OpenVPN > Exiting due to fatal error
. 2016.05.03 22:04:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:04:17 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 22:04:17 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:04:17 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:04:17 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:04:17 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.05.03 22:04:17 - Disconnecting
. 2016.05.03 22:04:17 - Management - Send 'signal SIGTERM'
. 2016.05.03 22:04:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:04:18 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 22:04:18 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:04:18 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:04:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:04:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:04:38 - Management - Send 'signal SIGTERM'
W 2016.05.03 22:04:38 - An established connection was aborted by the software in your host machine
. 2016.05.03 22:04:38 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 22:04:38 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:04:38 - Connection terminated.
. 2016.05.03 22:04:42 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:04:42 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
I 2016.05.03 22:04:42 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:04:43 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 22:04:48 - Checking authorization ...
! 2016.05.03 22:04:48 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 22:04:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 22:04:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 22:04:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 22:04:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 22:04:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 22:04:48 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 22:04:48 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 22:04:48 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=151ec4a3 60627f90
. 2016.05.03 22:04:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 22:04:48 - OpenVPN > Validating certificate key usage
. 2016.05.03 22:04:48 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 22:04:48 - OpenVPN > VERIFY KU OK
. 2016.05.03 22:04:48 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 22:04:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 22:04:48 - OpenVPN > VERIFY EKU OK
. 2016.05.03 22:04:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 22:04:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 22:04:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 22:04:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 22:04:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 22:04:53 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 22:04:53 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 22:04:53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 22:04:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 22:04:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 22:04:53 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 22:04:58 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - Starting Management Interface
. 2016.05.03 22:04:58 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 22:04:58 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:04:58 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 22:04:58 - Flushing DNS
I 2016.05.03 22:04:58 - Checking route
W 2016.05.03 22:05:10 - The remote name could not be resolved: 'nunki.airservers.org'
! 2016.05.03 22:05:10 - Disconnecting
. 2016.05.03 22:05:10 - Management - Send 'signal SIGTERM'
. 2016.05.03 22:05:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 22:05:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 22:05:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 22:05:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 22:05:15 - Connection terminated.
I 2016.05.03 22:05:15 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:05:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 22:05:18 - Checking authorization ...
! 2016.05.03 22:05:18 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 22:05:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 22:05:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 22:05:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 22:05:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 22:05:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 22:05:18 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 22:05:18 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 22:05:18 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=3eae7e28 bf531c61
. 2016.05.03 22:05:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 22:05:19 - OpenVPN > Validating certificate key usage
. 2016.05.03 22:05:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 22:05:19 - OpenVPN > VERIFY KU OK
. 2016.05.03 22:05:19 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 22:05:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 22:05:19 - OpenVPN > VERIFY EKU OK
. 2016.05.03 22:05:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 22:05:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 22:05:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 22:05:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 22:05:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 22:05:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 22:05:21 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 22:05:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 22:05:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 22:05:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 22:05:21 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 22:05:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - Starting Management Interface
. 2016.05.03 22:05:26 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 22:05:26 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:05:26 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 22:05:26 - Flushing DNS
I 2016.05.03 22:05:26 - Checking route
I 2016.05.03 22:05:38 - Checking DNS
! 2016.05.03 22:05:39 - Connected.
. 2016.05.03 22:05:39 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 22:05:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 22:12:50 - Updating systems & servers data ...
. 2016.05.03 22:12:50 - Systems & servers data update completed
. 2016.05.03 22:35:38 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 22:35:38 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 22:35:38 - OpenVPN > Exiting due to fatal error
. 2016.05.03 22:35:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:35:38 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
. 2016.05.03 22:35:38 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
! 2016.05.03 22:35:38 - Disconnecting
. 2016.05.03 22:35:38 - Management - Send 'signal SIGTERM'
. 2016.05.03 22:35:38 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:35:38 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:35:38 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:35:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:35:38 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 22:35:38 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:35:38 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:35:38 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:35:58 - Management - Send 'signal SIGTERM'
W 2016.05.03 22:35:58 - An established connection was aborted by the software in your host machine
. 2016.05.03 22:35:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:35:58 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 22:35:58 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:35:58 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:35:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:35:58 - Connection terminated.
I 2016.05.03 22:35:59 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:35:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 22:36:03 - Checking authorization ...
! 2016.05.03 22:36:04 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 22:36:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 22:36:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 22:36:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 22:36:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 22:36:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:04 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 22:36:04 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 22:36:04 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 22:36:04 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=649c43c5 5acf6194
. 2016.05.03 22:36:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 22:36:04 - OpenVPN > Validating certificate key usage
. 2016.05.03 22:36:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 22:36:04 - OpenVPN > VERIFY KU OK
. 2016.05.03 22:36:04 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 22:36:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 22:36:04 - OpenVPN > VERIFY EKU OK
. 2016.05.03 22:36:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 22:36:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 22:36:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 22:36:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 22:36:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 22:36:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 22:36:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 22:36:13 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 22:36:13 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 22:36:13 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 22:36:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 22:36:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 22:36:13 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 22:36:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - Starting Management Interface
. 2016.05.03 22:36:18 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 22:36:18 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:36:18 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 22:36:18 - Flushing DNS
I 2016.05.03 22:36:18 - Checking route
I 2016.05.03 22:36:43 - Checking DNS
! 2016.05.03 22:36:43 - Connected.
. 2016.05.03 22:36:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 22:36:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 22:43:28 - Updating systems & servers data ...
. 2016.05.03 22:43:29 - Systems & servers data update completed
. 2016.05.03 15:55:15 - OpenVPN > VERIFY KU OK
. 2016.05.03 15:55:15 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 15:55:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 15:55:15 - OpenVPN > VERIFY EKU OK
. 2016.05.03 15:55:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:55:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:55:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 15:55:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 15:55:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 15:55:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 15:55:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 15:55:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 15:55:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 15:55:21 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 15:55:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 15:55:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 15:55:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 15:55:21 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 15:55:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:55:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:26 - Starting Management Interface
. 2016.05.03 15:55:26 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 15:55:26 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:55:26 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 15:55:26 - Flushing DNS
I 2016.05.03 15:55:26 - Checking route
I 2016.05.03 15:55:50 - Checking DNS
! 2016.05.03 15:55:50 - Connected.
. 2016.05.03 15:55:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 15:55:51 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 15:55:51 - Disconnecting
. 2016.05.03 15:55:51 - Management - Send 'signal SIGTERM'
. 2016.05.03 15:55:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 15:55:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:55:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:55:56 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 15:55:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 15:55:57 - Connection terminated.
I 2016.05.03 15:55:57 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:55:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 15:55:57 - IPv6 restored.
! 2016.05.03 15:55:57 - Session terminated.
I 2016.05.03 15:56:29 - Session starting.
I 2016.05.03 15:56:29 - IPv6 disabled.
I 2016.05.03 15:56:29 - Checking authorization ...
! 2016.05.03 15:56:30 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 15:56:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 15:56:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 15:56:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 15:56:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 15:56:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 15:56:30 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 15:56:30 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 15:56:30 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=d2bcc9a6 8a7df192
. 2016.05.03 15:56:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 15:56:30 - OpenVPN > Validating certificate key usage
. 2016.05.03 15:56:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 15:56:30 - OpenVPN > VERIFY KU OK
. 2016.05.03 15:56:30 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 15:56:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 15:56:30 - OpenVPN > VERIFY EKU OK
. 2016.05.03 15:56:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 15:56:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 15:56:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 15:56:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 15:56:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 15:56:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 15:56:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 15:56:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 15:56:32 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 15:56:32 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 15:56:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 15:56:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 15:56:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 15:56:32 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 15:56:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:56:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 15:56:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 15:56:37 - Starting Management Interface
. 2016.05.03 15:56:37 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 15:56:37 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:56:37 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 15:56:37 - Flushing DNS
I 2016.05.03 15:56:37 - Checking route
I 2016.05.03 15:56:49 - Checking DNS
! 2016.05.03 15:57:01 - Connected.
. 2016.05.03 15:57:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 15:57:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 15:58:38 - Disconnecting
. 2016.05.03 15:58:38 - Management - Send 'signal SIGTERM'
. 2016.05.03 15:58:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 15:58:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 15:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 15:58:43 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 15:58:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 15:58:43 - Connection terminated.
I 2016.05.03 15:58:43 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 15:58:43 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 15:58:43 - IPv6 restored.
! 2016.05.03 15:58:44 - Session terminated.
. 2016.05.03 15:59:44 - Updating systems & servers data ...
. 2016.05.03 15:59:44 - Systems & servers data update completed
I 2016.05.03 16:00:42 - Session starting.
I 2016.05.03 16:00:42 - IPv6 disabled.
I 2016.05.03 16:00:42 - Checking authorization ...
! 2016.05.03 16:00:43 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 16:00:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 16:00:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 16:00:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 16:00:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 16:00:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:43 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 16:00:43 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 16:00:43 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 16:00:43 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=7e5bbec0 a7f17d45
. 2016.05.03 16:00:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 16:00:43 - OpenVPN > Validating certificate key usage
. 2016.05.03 16:00:43 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 16:00:43 - OpenVPN > VERIFY KU OK
. 2016.05.03 16:00:43 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 16:00:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 16:00:43 - OpenVPN > VERIFY EKU OK
. 2016.05.03 16:00:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:00:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:00:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 16:00:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 16:00:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 16:00:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 16:00:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 16:00:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 16:00:46 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 16:00:46 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 16:00:46 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 16:00:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 16:00:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 16:00:46 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 16:00:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:00:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:00:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:00:51 - Starting Management Interface
. 2016.05.03 16:00:51 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 16:00:51 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 16:00:51 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 16:00:51 - Flushing DNS
I 2016.05.03 16:00:51 - Checking route
I 2016.05.03 16:01:16 - Checking DNS
! 2016.05.03 16:01:16 - Connected.
. 2016.05.03 16:01:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 16:01:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 16:09:28 - Disconnecting
. 2016.05.03 16:09:28 - Management - Send 'signal SIGTERM'
. 2016.05.03 16:09:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 16:09:28 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:33 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 16:09:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 16:09:33 - Connection terminated.
I 2016.05.03 16:09:33 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 16:09:33 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 16:09:33 - IPv6 restored.
! 2016.05.03 16:09:33 - Session terminated.
I 2016.05.03 16:09:38 - Session starting.
I 2016.05.03 16:09:38 - IPv6 disabled.
I 2016.05.03 16:09:38 - Checking authorization ...
! 2016.05.03 16:09:39 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 16:09:39 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 16:09:39 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 16:09:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 16:09:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 16:09:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 16:09:39 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 16:09:39 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 16:09:39 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=4800b0f7 83033432
. 2016.05.03 16:09:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 16:09:39 - OpenVPN > Validating certificate key usage
. 2016.05.03 16:09:39 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 16:09:39 - OpenVPN > VERIFY KU OK
. 2016.05.03 16:09:39 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 16:09:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 16:09:39 - OpenVPN > VERIFY EKU OK
. 2016.05.03 16:09:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 16:09:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 16:09:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 16:09:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 16:09:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 16:09:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 16:09:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 16:09:42 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 16:09:42 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 16:09:42 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 16:09:42 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 16:09:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 16:09:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 16:09:42 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 16:09:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:09:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 16:09:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 16:09:47 - Starting Management Interface
. 2016.05.03 16:09:47 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 16:09:47 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 16:09:48 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 16:09:48 - Flushing DNS
I 2016.05.03 16:09:48 - Checking route
I 2016.05.03 16:10:12 - Checking DNS
! 2016.05.03 16:10:12 - Connected.
. 2016.05.03 16:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 16:10:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 16:29:55 - Updating systems & servers data ...
. 2016.05.03 16:29:55 - Systems & servers data update completed
. 2016.05.03 16:43:48 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 16:43:48 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 16:43:48 - OpenVPN > Exiting due to fatal error
. 2016.05.03 16:43:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 16:43:48 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 16:43:48 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 16:43:48 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.05.03 16:43:48 - Disconnecting
. 2016.05.03 16:43:48 - Management - Send 'signal SIGTERM'
. 2016.05.03 16:43:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 16:43:48 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 16:43:48 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 16:43:48 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 16:43:49 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 16:43:49 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 16:43:49 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 16:43:49 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 16:43:49 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 17:09:50 - Management - Send 'signal SIGTERM'
W 2016.05.03 17:09:50 - An established connection was aborted by the software in your host machine
. 2016.05.03 17:09:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:09:50 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 17:09:50 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 17:09:50 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 17:09:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 17:09:50 - OpenVPN > Closing TUN/TAP interface
W 2016.05.03 17:09:54 - Access is denied
. 2016.05.03 17:09:54 - Connection terminated.
I 2016.05.03 17:09:54 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:09:54 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 17:09:58 - Checking authorization ...
! 2016.05.03 17:09:59 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 17:09:59 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 17:09:59 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 17:09:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 17:09:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 17:09:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:09:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:09:59 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 17:09:59 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 17:09:59 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 17:09:59 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=f25655af d02bdd45
. 2016.05.03 17:09:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 17:09:59 - OpenVPN > Validating certificate key usage
. 2016.05.03 17:09:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 17:09:59 - OpenVPN > VERIFY KU OK
. 2016.05.03 17:09:59 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 17:09:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 17:09:59 - OpenVPN > VERIFY EKU OK
. 2016.05.03 17:09:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:10:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 17:10:00 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 17:10:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 17:10:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 17:10:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 17:10:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 17:10:02 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 17:10:02 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 17:10:02 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 17:10:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 17:10:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 17:10:02 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 17:10:05 - Updating systems & servers data ...
. 2016.05.03 17:10:06 - Systems & servers data update completed
. 2016.05.03 17:10:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:10:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:07 - Starting Management Interface
. 2016.05.03 17:10:07 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 17:10:07 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:10:07 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 17:10:07 - Flushing DNS
I 2016.05.03 17:10:07 - Checking route
I 2016.05.03 17:10:32 - Checking DNS
! 2016.05.03 17:10:32 - Connected.
. 2016.05.03 17:10:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 17:10:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.05.03 17:10:36 - Disconnecting
. 2016.05.03 17:10:36 - Management - Send 'signal SIGTERM'
. 2016.05.03 17:10:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 17:10:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:10:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:10:41 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 17:10:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 17:10:41 - Connection terminated.
I 2016.05.03 17:10:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:10:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 17:10:41 - IPv6 restored.
! 2016.05.03 17:10:41 - Session terminated.
I 2016.05.03 17:10:58 - Session starting.
I 2016.05.03 17:10:58 - IPv6 disabled.
I 2016.05.03 17:10:58 - Checking authorization ...
! 2016.05.03 17:10:58 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 17:10:58 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 17:10:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 17:10:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 17:10:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 17:10:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:10:58 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 17:10:58 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 17:10:58 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 17:10:58 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=0a7cd7ea 2ef496d3
. 2016.05.03 17:11:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 17:11:04 - OpenVPN > Validating certificate key usage
. 2016.05.03 17:11:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 17:11:04 - OpenVPN > VERIFY KU OK
. 2016.05.03 17:11:04 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 17:11:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 17:11:04 - OpenVPN > VERIFY EKU OK
. 2016.05.03 17:11:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:11:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 17:11:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 17:11:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 17:11:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 17:11:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 17:11:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 17:11:08 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 17:11:08 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 17:11:08 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 17:11:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 17:11:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 17:11:08 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 17:11:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:11:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:13 - Starting Management Interface
. 2016.05.03 17:11:13 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 17:11:13 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:11:13 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 17:11:13 - Flushing DNS
I 2016.05.03 17:11:13 - Checking route
I 2016.05.03 17:11:25 - Checking DNS
! 2016.05.03 17:11:38 - Connected.
. 2016.05.03 17:11:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 17:11:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.05.03 17:11:50 - Disconnecting
. 2016.05.03 17:11:50 - Management - Send 'signal SIGTERM'
. 2016.05.03 17:11:50 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 17:11:50 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:11:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 17:11:56 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 17:11:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 17:11:56 - Connection terminated.
I 2016.05.03 17:11:56 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:11:56 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 17:11:59 - Checking authorization ...
! 2016.05.03 17:11:59 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 17:11:59 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 17:11:59 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 17:11:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 17:11:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 17:11:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:11:59 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 17:11:59 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 17:11:59 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 17:11:59 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=49318a64 6ce59a9b
. 2016.05.03 17:11:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 17:11:59 - OpenVPN > Validating certificate key usage
. 2016.05.03 17:11:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 17:11:59 - OpenVPN > VERIFY KU OK
. 2016.05.03 17:11:59 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 17:11:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 17:11:59 - OpenVPN > VERIFY EKU OK
. 2016.05.03 17:11:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 17:12:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 17:12:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 17:12:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 17:12:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 17:12:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 17:12:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 17:12:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 17:12:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 17:12:05 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 17:12:05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 17:12:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 17:12:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 17:12:05 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 17:12:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 17:12:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 17:12:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 17:12:10 - Starting Management Interface
. 2016.05.03 17:12:10 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 17:12:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 17:12:10 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 17:12:10 - Flushing DNS
I 2016.05.03 17:12:10 - Checking route
I 2016.05.03 17:12:34 - Checking DNS
! 2016.05.03 17:12:46 - Connected.
. 2016.05.03 17:12:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 17:12:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 17:40:16 - Updating systems & servers data ...
. 2016.05.03 17:40:17 - Systems & servers data update completed
. 2016.05.03 18:10:26 - Updating systems & servers data ...
. 2016.05.03 18:10:26 - Systems & servers data update completed
. 2016.05.03 18:12:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 18:12:03 - OpenVPN > Validating certificate key usage
. 2016.05.03 18:12:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 18:12:03 - OpenVPN > VERIFY KU OK
. 2016.05.03 18:12:03 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 18:12:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 18:12:03 - OpenVPN > VERIFY EKU OK
. 2016.05.03 18:12:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 18:12:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 18:12:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 18:40:37 - Updating systems & servers data ...
. 2016.05.03 18:40:37 - Systems & servers data update completed
. 2016.05.03 19:10:48 - Updating systems & servers data ...
. 2016.05.03 19:10:48 - Systems & servers data update completed
I 2016.05.03 19:12:03 - Renewing TLS key
. 2016.05.03 19:12:03 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.05.03 19:12:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 19:12:05 - OpenVPN > Validating certificate key usage
. 2016.05.03 19:12:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 19:12:05 - OpenVPN > VERIFY KU OK
. 2016.05.03 19:12:05 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 19:12:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 19:12:05 - OpenVPN > VERIFY EKU OK
. 2016.05.03 19:12:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 19:12:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 19:12:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 19:40:59 - Updating systems & servers data ...
. 2016.05.03 19:41:00 - Systems & servers data update completed
. 2016.05.03 20:11:10 - Updating systems & servers data ...
. 2016.05.03 20:11:11 - Systems & servers data update completed
I 2016.05.03 20:12:05 - Renewing TLS key
. 2016.05.03 20:12:05 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.05.03 20:12:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 20:12:05 - OpenVPN > Validating certificate key usage
. 2016.05.03 20:12:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 20:12:05 - OpenVPN > VERIFY KU OK
. 2016.05.03 20:12:05 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 20:12:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 20:12:05 - OpenVPN > VERIFY EKU OK
. 2016.05.03 20:12:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:12:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:12:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 20:33:18 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 20:33:18 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 20:33:18 - OpenVPN > Exiting due to fatal error
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 20:33:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 20:33:18 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.05.03 20:33:18 - Disconnecting
. 2016.05.03 20:33:18 - Management - Send 'signal SIGTERM'
. 2016.05.03 20:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 20:33:18 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 20:33:18 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 20:33:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 20:33:19 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 20:38:48 - Connection terminated.
I 2016.05.03 20:38:49 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 20:38:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 20:39:01 - Checking authorization ...
! 2016.05.03 20:39:01 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 20:39:01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 20:39:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 20:39:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 20:39:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 20:39:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 20:39:01 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 20:39:01 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 20:39:01 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=d50c427c 1f0e5175
. 2016.05.03 20:39:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 20:39:01 - OpenVPN > Validating certificate key usage
. 2016.05.03 20:39:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 20:39:01 - OpenVPN > VERIFY KU OK
. 2016.05.03 20:39:01 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 20:39:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 20:39:01 - OpenVPN > VERIFY EKU OK
. 2016.05.03 20:39:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 20:39:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 20:39:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 20:39:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 20:39:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 20:39:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 20:39:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 20:39:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 20:39:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 20:39:05 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 20:39:05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 20:39:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 20:39:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 20:39:05 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 20:39:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 20:39:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 20:39:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 20:39:10 - Starting Management Interface
. 2016.05.03 20:39:10 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 20:39:10 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 20:39:10 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 20:39:10 - Flushing DNS
I 2016.05.03 20:39:10 - Checking route
I 2016.05.03 20:39:23 - Checking DNS
! 2016.05.03 20:39:23 - Connected.
. 2016.05.03 20:39:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 20:39:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 20:41:48 - Updating systems & servers data ...
. 2016.05.03 20:41:49 - Systems & servers data update completed
. 2016.05.03 21:12:00 - Updating systems & servers data ...
. 2016.05.03 21:12:01 - Systems & servers data update completed
. 2016.05.03 21:39:02 - OpenVPN > TLS: soft reset sec=0 bytes=11874878/0 pkts=22676/0
. 2016.05.03 21:39:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 21:39:03 - OpenVPN > Validating certificate key usage
. 2016.05.03 21:39:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 21:39:03 - OpenVPN > VERIFY KU OK
. 2016.05.03 21:39:03 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 21:39:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 21:39:03 - OpenVPN > VERIFY EKU OK
. 2016.05.03 21:39:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 21:39:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 21:39:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 21:42:13 - Updating systems & servers data ...
. 2016.05.03 21:42:14 - Systems & servers data update completed
. 2016.05.03 22:04:17 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 22:04:17 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 22:04:17 - OpenVPN > Exiting due to fatal error
. 2016.05.03 22:04:17 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:04:17 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 22:04:17 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:04:17 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:04:17 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:04:17 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.05.03 22:04:17 - Disconnecting
. 2016.05.03 22:04:17 - Management - Send 'signal SIGTERM'
. 2016.05.03 22:04:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:04:18 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 22:04:18 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:04:18 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:04:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:04:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:04:38 - Management - Send 'signal SIGTERM'
W 2016.05.03 22:04:38 - An established connection was aborted by the software in your host machine
. 2016.05.03 22:04:38 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 22:04:38 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:04:38 - Connection terminated.
. 2016.05.03 22:04:42 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:04:42 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
I 2016.05.03 22:04:42 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:04:43 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 22:04:48 - Checking authorization ...
! 2016.05.03 22:04:48 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 22:04:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 22:04:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 22:04:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 22:04:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 22:04:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 22:04:48 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 22:04:48 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 22:04:48 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=151ec4a3 60627f90
. 2016.05.03 22:04:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 22:04:48 - OpenVPN > Validating certificate key usage
. 2016.05.03 22:04:48 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 22:04:48 - OpenVPN > VERIFY KU OK
. 2016.05.03 22:04:48 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 22:04:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 22:04:48 - OpenVPN > VERIFY EKU OK
. 2016.05.03 22:04:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:04:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:04:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 22:04:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 22:04:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 22:04:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 22:04:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 22:04:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 22:04:53 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 22:04:53 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 22:04:53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 22:04:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 22:04:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 22:04:53 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 22:04:58 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:04:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:04:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:04:58 - Starting Management Interface
. 2016.05.03 22:04:58 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 22:04:58 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:04:58 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 22:04:58 - Flushing DNS
I 2016.05.03 22:04:58 - Checking route
W 2016.05.03 22:05:10 - The remote name could not be resolved: 'nunki.airservers.org'
! 2016.05.03 22:05:10 - Disconnecting
. 2016.05.03 22:05:10 - Management - Send 'signal SIGTERM'
. 2016.05.03 22:05:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 22:05:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.05.03 22:05:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:15 - OpenVPN > Closing TUN/TAP interface
. 2016.05.03 22:05:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.05.03 22:05:15 - Connection terminated.
I 2016.05.03 22:05:15 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:05:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 22:05:18 - Checking authorization ...
! 2016.05.03 22:05:18 - Connecting to Nunki (United Kingdom, Manchester)
. 2016.05.03 22:05:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 22:05:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 22:05:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 22:05:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 22:05:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 22:05:18 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 22:05:18 - OpenVPN > UDPv4 link remote: [AF_INET]78.129.153.40:443
. 2016.05.03 22:05:18 - OpenVPN > TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=3eae7e28 bf531c61
. 2016.05.03 22:05:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 22:05:19 - OpenVPN > Validating certificate key usage
. 2016.05.03 22:05:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 22:05:19 - OpenVPN > VERIFY KU OK
. 2016.05.03 22:05:19 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 22:05:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 22:05:19 - OpenVPN > VERIFY EKU OK
. 2016.05.03 22:05:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:05:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:05:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 22:05:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443
. 2016.05.03 22:05:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 22:05:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.40.250 255.255.0.0'
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 22:05:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 22:05:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 22:05:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 22:05:21 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 22:05:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 22:05:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.40.250/255.255.0.0 [sUCCEEDED]
. 2016.05.03 22:05:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.40.250/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 22:05:21 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 22:05:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:05:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:05:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:05:26 - Starting Management Interface
. 2016.05.03 22:05:26 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 22:05:26 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:05:26 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 22:05:26 - Flushing DNS
I 2016.05.03 22:05:26 - Checking route
I 2016.05.03 22:05:38 - Checking DNS
! 2016.05.03 22:05:39 - Connected.
. 2016.05.03 22:05:39 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 22:05:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 22:12:50 - Updating systems & servers data ...
. 2016.05.03 22:12:50 - Systems & servers data update completed
. 2016.05.03 22:35:38 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.05.03 22:35:38 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.05.03 22:35:38 - OpenVPN > Exiting due to fatal error
. 2016.05.03 22:35:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 78.129.153.40 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:35:38 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
. 2016.05.03 22:35:38 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
! 2016.05.03 22:35:38 - Disconnecting
. 2016.05.03 22:35:38 - Management - Send 'signal SIGTERM'
. 2016.05.03 22:35:38 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:35:38 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:35:38 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:35:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:35:38 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.1.254
. 2016.05.03 22:35:38 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:35:38 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:35:38 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:35:58 - Management - Send 'signal SIGTERM'
W 2016.05.03 22:35:58 - An established connection was aborted by the software in your host machine
. 2016.05.03 22:35:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:35:58 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.05.03 22:35:58 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.05.03 22:35:58 - OpenVPN > Route deletion fallback to route.exe
. 2016.05.03 22:35:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.05.03 22:35:58 - Connection terminated.
I 2016.05.03 22:35:59 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:35:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.05.03 22:36:03 - Checking authorization ...
! 2016.05.03 22:36:04 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.05.03 22:36:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.05.03 22:36:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.05.03 22:36:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.05.03 22:36:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.05.03 22:36:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:04 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.05.03 22:36:04 - OpenVPN > UDPv4 link local: [undef]
. 2016.05.03 22:36:04 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443
. 2016.05.03 22:36:04 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=649c43c5 5acf6194
. 2016.05.03 22:36:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.05.03 22:36:04 - OpenVPN > Validating certificate key usage
. 2016.05.03 22:36:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.05.03 22:36:04 - OpenVPN > VERIFY KU OK
. 2016.05.03 22:36:04 - OpenVPN > Validating certificate extended key usage
. 2016.05.03 22:36:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.05.03 22:36:04 - OpenVPN > VERIFY EKU OK
. 2016.05.03 22:36:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.05.03 22:36:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.05.03 22:36:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.05.03 22:36:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.05.03 22:36:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.05.03 22:36:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.129 255.255.0.0'
. 2016.05.03 22:36:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.05.03 22:36:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.05.03 22:36:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.05.03 22:36:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.05.03 22:36:13 - OpenVPN > open_tun, tt->ipv6=0
. 2016.05.03 22:36:13 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{FAA901D1-9056-4E02-869A-36B4338C52AC}.tap
. 2016.05.03 22:36:13 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.05.03 22:36:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.129/255.255.0.0 [sUCCEEDED]
. 2016.05.03 22:36:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.129/255.255.0.0 on interface {FAA901D1-9056-4E02-869A-36B4338C52AC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.05.03 22:36:13 - OpenVPN > Successful ARP Flush on interface [15] {FAA901D1-9056-4E02-869A-36B4338C52AC}
. 2016.05.03 22:36:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 192.168.1.254
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 2
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.05.03 22:36:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.05.03 22:36:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.05.03 22:36:18 - Starting Management Interface
. 2016.05.03 22:36:18 - OpenVPN > Initialization Sequence Completed
I 2016.05.03 22:36:18 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.05.03 22:36:18 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.05.03 22:36:18 - Flushing DNS
I 2016.05.03 22:36:18 - Checking route
I 2016.05.03 22:36:43 - Checking DNS
! 2016.05.03 22:36:43 - Connected.
. 2016.05.03 22:36:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.05.03 22:36:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.05.03 22:43:28 - Updating systems & servers data ...
. 2016.05.03 22:43:29 - Systems & servers data update completed
 

 

Share this post


Link to post

@rui789:  In the future, please attach your log files instead of copying and pasting the entire contents in your post.  It's a pain in the rump having to scroll through the entire contents of your posts.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...