Jump to content
Not connected, Your IP: 3.141.0.61
Sign in to follow this  
whatthewhat

Torrents crashing Eddie - disconnect loop

Recommended Posts

Every time I try to DL a torrent with airvpn on it almost instantly disconnects and starts a constant cycle of attempts to restart my connection through eddie.  The only way to get my connection back is to exit the torrent client, exit eddie (which seems to hang), reset my LAN settings manually, then restart eddie.  I have tried multiple clients (uTorrent/Deluge/qBittorrent) and they all do the same thing.

 

I will attempt to attach a relevant portion of the logs with a spoiler tag to see if that helps.

 

TIA

 

[spoiler]

2016.04.04 18:22:00 - Updating systems & servers data ...
. 2016.04.04 18:22:01 - Systems & servers data update completed
. 2016.04.04 18:32:02 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.04.04 18:32:02 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.04.04 18:32:02 - OpenVPN > Restart pause, 2 second(s)
! 2016.04.04 18:32:02 - Disconnecting
. 2016.04.04 18:32:02 - Management - Send 'signal SIGTERM'
. 2016.04.04 18:32:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.04 18:32:02 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.04.04 18:32:02 - OpenVPN > Assertion failed at misc.c:779
. 2016.04.04 18:32:02 - OpenVPN > Exiting due to fatal error
. 2016.04.04 18:32:02 - Connection terminated.
I 2016.04.04 18:32:02 - DNS of a network adapter restored to original settings (Intel® 82583V Gigabit Network Connection)
I 2016.04.04 18:32:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.04.04 18:32:52 - Checking authorization ...
. 2016.04.04 18:33:13 - Checking authorization ..., 1° try failed (Unable to connect to the remote server)
. 2016.04.04 18:33:34 - Checking authorization ..., 2° try failed (Unable to connect to the remote server)
. 2016.04.04 18:33:55 - Checking authorization ..., 3° try failed (Unable to connect to the remote server)
. 2016.04.04 18:34:16 - Checking authorization ..., 4° try failed (Unable to connect to the remote server)
W 2016.04.04 18:34:16 - Authorization check failed, continue anyway ({1])
! 2016.04.04 18:34:16 - Connecting to Tegmen (Canada, Toronto, Ontario)
. 2016.04.04 18:34:40 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.04 18:34:40 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.04 18:34:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.04 18:34:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.04 18:34:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.04 18:34:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.04 18:34:40 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.04 18:34:40 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.04 18:34:40 - OpenVPN > UDPv4 link remote: [AF_INET]137.63.71.50:443
. 2016.04.04 18:34:40 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=8c39148a d97ed27b
. 2016.04.04 18:34:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.04 18:34:41 - OpenVPN > Validating certificate key usage
. 2016.04.04 18:34:41 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.04.04 18:34:41 - OpenVPN > VERIFY KU OK
. 2016.04.04 18:34:41 - OpenVPN > Validating certificate extended key usage
. 2016.04.04 18:34:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.04 18:34:41 - OpenVPN > VERIFY EKU OK
. 2016.04.04 18:34:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.04 18:34:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.04 18:34:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.04 18:34:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.04 18:34:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.04 18:34:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.04 18:34:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]137.63.71.50:443
. 2016.04.04 18:34:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.04 18:34:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.197 255.255.0.0'
. 2016.04.04 18:34:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.04 18:34:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.04 18:34:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.04 18:34:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.04 18:34:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.04 18:34:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.04 18:34:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.04 18:34:46 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.04 18:34:46 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{9ECB9421-EDDF-4194-9D61-7528F02A4E34}.tap
. 2016.04.04 18:34:46 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.04 18:34:46 - OpenVPN > Exiting due to fatal error
! 2016.04.04 18:34:46 - Disconnecting
. 2016.04.04 18:34:46 - Connection terminated.
I 2016.04.04 18:34:49 - Checking authorization ...
. 2016.04.04 18:34:59 - Checking authorization ..., 1° try failed (The operation has timed out)
. 2016.04.04 18:35:09 - Checking authorization ..., 2° try failed (The operation has timed out)

[/spoiler]

 

Share this post


Link to post

Hello !

 

Plus use spoiler tags for your logs. Check my signature.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hey guys, thanks for your replies, sorry it took me so long to get back to you but I have been away.

 

 

@ LastChance:  I tried uninstalling the 9.21 TAP driver previously as I have read about the issues.  I installed the 9.9 TAP driver as recommended, but when I tried it though it kept reverting back to the 9.21 driver even though I had checked the box in the advanced settings of Eddie to "disable driver upgrade"...I tried it several times and had the same issue, every time I restarted Eddie it would reload 9.21 on me.  Soooo, I decided to try it again after reading your link, but this time I uninstalled EVERYTHING and started fresh; however, this time it seems to be remaining on the TAP 9.9 driver as it should of the first few times.  So far that has allowed me to run a torrent client again temporarily, although it still disconnected after about 5-10 mins now, but that is an improvement over the instant disconnect I was having previously.  I will try a few other things over the next few days and update this thread if I find anything useful.

 

 

@ LZ1:  Sorry, I attempted to use the spoiler tags as your example shows, but it obviously didn't work for me as you can see.......you can see the spoiler tags at the start and end of my log, can you tell me what I did wrong cause I can't seem to figure it out.  I DID try though......

 

 

Thanks again for your time guys, I really appreciate it.  I am not the most "tech-savvy" person so I am doing my best to get the hang of these things.

Share this post


Link to post

OK, I have changed to "Protocol TCP, port 443" under the protocols tab in the settings now as suggested.

 

I did install as administrator, both Eddie and the TAP driver, just in case.

 

I am running Windows 8.1, x64.

 

One thing I have noticed after attempting to run a torrent client over night and resetting Eddie several times, is that I am unsure which TAP driver is actually installed now. 

In the Eddie log it now shows "2016.04.15 17:26:28 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1" , but in the program manager in Windows it shows as "TAP-Windows 9.2.2", and if I go in to the network adapters, select the TAP Windows adapter and check the driver that way it shows as driver version 9.0.0.21.  Any idea which one is actually installed?  I have verified that the "disable driver upgrade" box is still checked in the advanced settings.

 

I will have to retry the torrents tonight and see if that "Protocol TCP, port 443" setting has improved the situation.  I will get back to you as soon as I have anything new.

 

Thanks again!!!

Share this post


Link to post

OK, looks like the problem is persisting.  Was working for maybe 20 mins or so, then I got the following:

 

 

. 2016.04.15 19:27:23 - Updating systems & servers data ...
. 2016.04.15 19:27:24 - Systems & servers data update completed
. 2016.04.15 19:57:36 - Updating systems & servers data ...
. 2016.04.15 19:57:37 - Systems & servers data update completed
. 2016.04.15 20:23:14 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.04.15 20:23:14 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.04.15 20:23:14 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.15 20:23:14 - Disconnecting
. 2016.04.15 20:23:14 - Management - Send 'signal SIGTERM'
. 2016.04.15 20:23:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.15 20:23:14 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.04.15 20:23:14 - OpenVPN > Assertion failed at misc.c:779
. 2016.04.15 20:23:14 - OpenVPN > Exiting due to fatal error
. 2016.04.15 20:23:14 - Connection terminated.
I 2016.04.15 20:23:14 - DNS of a network adapter restored to original settings (Intel® 82583V Gigabit Network Connection)
I 2016.04.15 20:23:14 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.04.15 20:24:05 - Checking authorization ...
W 2016.04.15 20:25:29 - Authorization check failed, continue anyway ({1])
! 2016.04.15 20:25:29 - Connecting to Gorgonea (Canada, Toronto, Ontario)
. 2016.04.15 20:25:53 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:25:53 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:25:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:25:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:25:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:25:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:25:53 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:25:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.250:443 [nonblock]
. 2016.04.15 20:26:03 - OpenVPN > TCP: connect to [AF_INET]104.254.90.250:443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2016.04.15 20:26:03 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2016.04.15 20:26:03 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.15 20:26:03 - Disconnecting
. 2016.04.15 20:26:03 - Connection terminated.
I 2016.04.15 20:26:07 - Checking authorization ...
W 2016.04.15 20:26:47 - Authorization check failed, continue anyway ({1])
! 2016.04.15 20:26:47 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:27:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:27:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:27:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:27:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:27:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:27:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:27:11 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:27:11 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:27:21 - OpenVPN > TCP: connect to [AF_INET]64.120.44.138:443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2016.04.15 20:27:21 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2016.04.15 20:27:21 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.15 20:27:21 - Disconnecting
. 2016.04.15 20:27:21 - Connection terminated.
I 2016.04.15 20:27:24 - Checking authorization ...
. 2016.04.15 20:27:49 - Updating systems & servers data ...
W 2016.04.15 20:28:05 - Authorization check failed, continue anyway ({1])
! 2016.04.15 20:28:05 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:28:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:28:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:28:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:28:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:28:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:09 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:28:09 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:28:19 - OpenVPN > TCP: connect to [AF_INET]64.120.44.138:443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2016.04.15 20:28:19 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2016.04.15 20:28:19 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.15 20:28:19 - Disconnecting
. 2016.04.15 20:28:19 - Connection terminated.
I 2016.04.15 20:28:22 - Checking authorization ...
. 2016.04.15 20:28:39 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (The operation has timed out)
! 2016.04.15 20:28:42 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:28:42 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:28:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:28:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:28:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:28:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:43 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:28:43 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:28:44 - OpenVPN > TCP connection established with [AF_INET]64.120.44.138:443
. 2016.04.15 20:28:44 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.15 20:28:44 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]64.120.44.138:443
. 2016.04.15 20:28:44 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=11e32eef 21a4ddf8
. 2016.04.15 20:28:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.15 20:28:44 - OpenVPN > Validating certificate key usage
. 2016.04.15 20:28:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.15 20:28:44 - OpenVPN > VERIFY KU OK
. 2016.04.15 20:28:44 - OpenVPN > Validating certificate extended key usage
. 2016.04.15 20:28:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.15 20:28:44 - OpenVPN > VERIFY EKU OK
. 2016.04.15 20:28:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.15 20:28:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:28:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:28:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.15 20:28:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.04.15 20:28:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.15 20:28:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.94 255.255.0.0'
. 2016.04.15 20:28:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.15 20:28:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.15 20:28:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.15 20:28:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.15 20:28:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.15 20:28:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.15 20:28:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.15 20:28:47 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.15 20:28:47 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{3AC72083-5513-436A-98B2-729F4B50298C}.tap
. 2016.04.15 20:28:47 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.15 20:28:47 - OpenVPN > Exiting due to fatal error
! 2016.04.15 20:28:47 - Disconnecting
. 2016.04.15 20:28:47 - Connection terminated.
I 2016.04.15 20:28:51 - Checking authorization ...
! 2016.04.15 20:28:51 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:28:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:28:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:28:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:28:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:28:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:52 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:28:52 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:28:52 - OpenVPN > TCP connection established with [AF_INET]64.120.44.138:443
. 2016.04.15 20:28:52 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.15 20:28:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]64.120.44.138:443
. 2016.04.15 20:28:52 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=d63d87f5 e4e159dd
. 2016.04.15 20:28:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.15 20:28:53 - OpenVPN > Validating certificate key usage
. 2016.04.15 20:28:53 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.15 20:28:53 - OpenVPN > VERIFY KU OK
. 2016.04.15 20:28:53 - OpenVPN > Validating certificate extended key usage
. 2016.04.15 20:28:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.15 20:28:53 - OpenVPN > VERIFY EKU OK
. 2016.04.15 20:28:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.15 20:28:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:28:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:28:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:28:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.15 20:28:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.04.15 20:28:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.15 20:28:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.94 255.255.0.0'
. 2016.04.15 20:28:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.15 20:28:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.15 20:28:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.15 20:28:56 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.15 20:28:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.15 20:28:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.15 20:28:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.15 20:28:56 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.15 20:28:56 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{3AC72083-5513-436A-98B2-729F4B50298C}.tap
. 2016.04.15 20:28:56 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.15 20:28:56 - OpenVPN > Exiting due to fatal error
! 2016.04.15 20:28:56 - Disconnecting
. 2016.04.15 20:28:56 - Connection terminated.
I 2016.04.15 20:28:59 - Checking authorization ...
! 2016.04.15 20:28:59 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:29:02 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:29:02 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:29:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:29:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:29:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:02 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:29:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:29:03 - OpenVPN > TCP connection established with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:03 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.15 20:29:03 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:03 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=e3b64ba5 dbfcbbf3
. 2016.04.15 20:29:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.15 20:29:04 - OpenVPN > Validating certificate key usage
. 2016.04.15 20:29:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.15 20:29:04 - OpenVPN > VERIFY KU OK
. 2016.04.15 20:29:04 - OpenVPN > Validating certificate extended key usage
. 2016.04.15 20:29:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.15 20:29:04 - OpenVPN > VERIFY EKU OK
. 2016.04.15 20:29:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.15 20:29:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.15 20:29:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.15 20:29:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.94 255.255.0.0'
. 2016.04.15 20:29:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.15 20:29:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.15 20:29:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.15 20:29:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.15 20:29:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.15 20:29:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.15 20:29:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.15 20:29:07 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.15 20:29:07 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{3AC72083-5513-436A-98B2-729F4B50298C}.tap
. 2016.04.15 20:29:07 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.15 20:29:07 - OpenVPN > Exiting due to fatal error
! 2016.04.15 20:29:07 - Disconnecting
. 2016.04.15 20:29:07 - Connection terminated.
I 2016.04.15 20:29:10 - Checking authorization ...
! 2016.04.15 20:29:10 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:29:10 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:29:10 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:29:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:29:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:29:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:11 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:29:11 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:29:11 - OpenVPN > TCP connection established with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:11 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.15 20:29:11 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:11 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=d2cbbf42 21cb61be
. 2016.04.15 20:29:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.15 20:29:12 - OpenVPN > Validating certificate key usage
. 2016.04.15 20:29:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.15 20:29:12 - OpenVPN > VERIFY KU OK
. 2016.04.15 20:29:12 - OpenVPN > Validating certificate extended key usage
. 2016.04.15 20:29:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.15 20:29:12 - OpenVPN > VERIFY EKU OK
. 2016.04.15 20:29:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.15 20:29:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.15 20:29:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.15 20:29:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.94 255.255.0.0'
. 2016.04.15 20:29:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.15 20:29:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.15 20:29:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.15 20:29:15 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.15 20:29:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.15 20:29:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.15 20:29:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.15 20:29:15 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.15 20:29:15 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{3AC72083-5513-436A-98B2-729F4B50298C}.tap
. 2016.04.15 20:29:15 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.15 20:29:15 - OpenVPN > Exiting due to fatal error
! 2016.04.15 20:29:15 - Disconnecting
. 2016.04.15 20:29:15 - Connection terminated.
I 2016.04.15 20:29:18 - Checking authorization ...
! 2016.04.15 20:29:18 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:29:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:29:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:29:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:29:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:29:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:19 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:29:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:29:20 - OpenVPN > TCP connection established with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:20 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.15 20:29:20 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:20 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=0d972647 cf199785
. 2016.04.15 20:29:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.15 20:29:20 - OpenVPN > Validating certificate key usage
. 2016.04.15 20:29:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.15 20:29:20 - OpenVPN > VERIFY KU OK
. 2016.04.15 20:29:20 - OpenVPN > Validating certificate extended key usage
. 2016.04.15 20:29:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.15 20:29:20 - OpenVPN > VERIFY EKU OK
. 2016.04.15 20:29:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.15 20:29:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.15 20:29:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.15 20:29:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.94 255.255.0.0'
. 2016.04.15 20:29:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.15 20:29:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.15 20:29:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.15 20:29:23 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.15 20:29:23 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.15 20:29:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.15 20:29:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.15 20:29:23 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.15 20:29:23 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{3AC72083-5513-436A-98B2-729F4B50298C}.tap
. 2016.04.15 20:29:23 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.15 20:29:23 - OpenVPN > Exiting due to fatal error
! 2016.04.15 20:29:23 - Disconnecting
. 2016.04.15 20:29:23 - Connection terminated.
I 2016.04.15 20:29:26 - Checking authorization ...
! 2016.04.15 20:29:27 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:29:27 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:29:27 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:29:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:29:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:29:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:27 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:29:27 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:29:28 - OpenVPN > TCP connection established with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:28 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.15 20:29:28 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:28 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=6d2fc38a c287f453
. 2016.04.15 20:29:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.15 20:29:28 - OpenVPN > Validating certificate key usage
. 2016.04.15 20:29:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.15 20:29:28 - OpenVPN > VERIFY KU OK
. 2016.04.15 20:29:28 - OpenVPN > Validating certificate extended key usage
. 2016.04.15 20:29:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.15 20:29:28 - OpenVPN > VERIFY EKU OK
. 2016.04.15 20:29:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.15 20:29:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.15 20:29:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.15 20:29:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.94 255.255.0.0'
. 2016.04.15 20:29:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.15 20:29:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.15 20:29:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.15 20:29:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.15 20:29:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.15 20:29:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.15 20:29:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.15 20:29:31 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.15 20:29:31 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{3AC72083-5513-436A-98B2-729F4B50298C}.tap
. 2016.04.15 20:29:31 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.15 20:29:31 - OpenVPN > Exiting due to fatal error
! 2016.04.15 20:29:31 - Disconnecting
. 2016.04.15 20:29:31 - Connection terminated.
I 2016.04.15 20:29:34 - Checking authorization ...
! 2016.04.15 20:29:35 - Connecting to Rasalas (United States, Newark, New Jersey)
. 2016.04.15 20:29:35 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.15 20:29:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.15 20:29:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.15 20:29:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.15 20:29:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:35 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2016.04.15 20:29:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.120.44.138:443 [nonblock]
. 2016.04.15 20:29:36 - OpenVPN > TCP connection established with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:36 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.15 20:29:36 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:36 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=c8b0c1d3 56fbcda8
. 2016.04.15 20:29:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.15 20:29:36 - OpenVPN > Validating certificate key usage
. 2016.04.15 20:29:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.15 20:29:36 - OpenVPN > VERIFY KU OK
. 2016.04.15 20:29:36 - OpenVPN > Validating certificate extended key usage
. 2016.04.15 20:29:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.15 20:29:36 - OpenVPN > VERIFY EKU OK
. 2016.04.15 20:29:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.15 20:29:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.15 20:29:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.15 20:29:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.15 20:29:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443
. 2016.04.15 20:29:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.15 20:29:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.94 255.255.0.0'
. 2016.04.15 20:29:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.15 20:29:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.15 20:29:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.15 20:29:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.15 20:29:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.15 20:29:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.15 20:29:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.15 20:29:39 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.15 20:29:39 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{3AC72083-5513-436A-98B2-729F4B50298C}.tap
. 2016.04.15 20:29:39 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.04.15 20:29:39 - OpenVPN > Exiting due to fatal error
! 2016.04.15 20:29:39 - Disconnecting
. 2016.04.15 20:29:39 - Connection terminated.

 

...and the cycle just continues until I exit Eddie, reset my network adapters, and then restart Eddie.  Very frustrating.

Share this post


Link to post

reset my LAN settings manually.

 

I hope you are using windows,

 

My ISP changes its (my modem IP address regularly); so, in the Windows network adapter, I checked "obtained IP addresses automatically".

 

My router is set up to discover the ISP changes automatically, also; so I do not lose connection.

 

down at the bottom; I checked "Use the following DNS addresses".

 

I learned my ISP's DNS addresses; I set my those addresses in my router.

 

Eddie client forces the changes in the DNS address to (UDP 10.4.x.x) or (TCP 10.5.x.x) When you disconnect the eddie client; eddie client restores those original DNS servers addresses.

 

By selecting the Country VPN, from airVPN, eddie client is changing the IP address so the router should automatically change the IP address BUT IF this option is not used"obtain IP address automatically" ( in the computers network adapter)

I believe conflicts will occur thus disconnecting you from the internet and torrent.

 

I am hoping this is the problem for your disconnections.

Share this post


Link to post

I'm sorry, but I don't quite follow your last post. 

 

I am using windows 8.1 x64, and the windows network adapter is set to "obtain IP addresses automatically"  I have not made any changes at all to my router settings......do I need to change something?

 

As far as my ISP's DNS addresses go, how would I find those and where would I enter those addresses in to once I find them?  Again, I am not very technical so you may have to "dumb it down" for me if possible. 

 

I really appreciate you taking your time to try and help me figure this out.  I have been looking through any threads I can find that deal with similar issues and I haven't had any luck.  Still not 100% sure which TAP driver I am using either or if that is part of my issue.

 

In the Eddie log window it now shows "2016.04.15 17:26:28 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1" , but in the program manager for Windows it shows it as "TAP-Windows 9.2.2", and if I go in to my network adapters, select the TAP Windows adapter and check the driver that way it shows up as driver version 9.0.0.21

 

Share this post


Link to post

I was wondering when you mentioned you were manually setting your LAN settings.

 

The quote, showing, has me stumped on why each one is reporting a different TAP-Windows adapter version.

 

To find your ISPs DNS addresses: Make sure you are not connected to your router but directly connected to your ISP.

 

1) go to start menu

2) search box type in "cmd". do not type quotations marks

3) a small black screen will open type in "ipconfig/all"

 

2 section to look for:

1) ethernet adapter  OR

2) wireless adapter

3) look for IPv4 address

IPv4 submask

IPv4 default gateway

then somewhere below those it should show

2 DNS addresses but that depends on your IP

 

OK. On my windows device manager, it shows TAP-Windows adapter 9.0.0.21; I have Win 7.

Eddie clent is showing TAP adapter as version 9.21.

 

I use qBittorrent.

 

Can you please check your firewall on your system and router?
Found this in another article.
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...