strykenKN 0 Posted ... So I once again installed your client on Windows 10 and once again problems!1. remote name could not be resolved (at each IP address as Holland, Canada, etc.)Log on depends! I 2016.04.05 22:29:21 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.04.05 22:29:22 - Reading options from C:\Users\gerha\AppData\Local\AirVPN\AirVPN.xml . 2016.04.05 22:29:24 - Data Path: C:\Users\gerha\AppData\Local\AirVPN . 2016.04.05 22:29:24 - App Path: C:\Program Files\AirVPN . 2016.04.05 22:29:24 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.04.05 22:29:24 - Command line arguments (1): path="home" . 2016.04.05 22:29:24 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.04.05 22:29:24 - Updating systems & servers data ... I 2016.04.05 22:29:25 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1 I 2016.04.05 22:29:25 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe) I 2016.04.05 22:29:25 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.04.05 22:29:25 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe) W 2016.04.05 22:29:25 - Recovery. Unexpected crash? ! 2016.04.05 22:29:25 - Deactivation of Network Lock . 2016.04.05 22:29:31 - Systems & servers data update completed ! 2016.04.05 22:29:31 - Activation of Network Lock - Windows Firewall I 2016.04.05 22:29:38 - Session starting. I 2016.04.05 22:29:38 - IPv6 disabled. I 2016.04.05 22:29:46 - Checking authorization ... ! 2016.04.05 22:29:46 - Connecting to Tarazed (Netherlands, Alblasserdam) . 2016.04.05 22:29:46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:29:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:29:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:29:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:29:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:29:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:29:46 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:29:46 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.132:443 [nonblock] . 2016.04.05 22:29:47 - OpenVPN > TCP connection established with [AF_INET]213.152.161.132:443 . 2016.04.05 22:29:47 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:29:47 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.132:443 . 2016.04.05 22:29:47 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.132:443, sid=ddcffdd5 e46bb35b . 2016.04.05 22:29:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:29:47 - OpenVPN > Validating certificate key usage . 2016.04.05 22:29:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:29:47 - OpenVPN > VERIFY KU OK . 2016.04.05 22:29:47 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:29:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:29:47 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:29:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:29:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:29:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:29:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:29:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:29:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:29:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.132:443 . 2016.04.05 22:29:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:29:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.15 255.255.0.0' . 2016.04.05 22:29:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:29:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:29:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:29:50 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:29:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:29:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:29:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:29:50 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:29:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:29:51 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:29:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.15/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:29:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.15/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:29:51 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:29:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:29:55 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:29:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:29:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:29:55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:29:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:29:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:29:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:29:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:29:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:29:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:29:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:29:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:29:55 - Starting Management Interface . 2016.04.05 22:29:55 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:29:55 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:29:55 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:29:55 - Flushing DNS I 2016.04.05 22:29:55 - Checking route W 2016.04.05 22:30:19 - Der Remotename konnte nicht aufgelöst werden: 'tarazed_exit.airservers.org' ! 2016.04.05 22:30:19 - Disconnecting . 2016.04.05 22:30:19 - Management - Send 'signal SIGTERM' . 2016.04.05 22:30:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:30:19 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:30:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:19 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:30:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:19 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:30:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:19 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:30:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:19 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:30:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:30:19 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.05 22:30:19 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:30:19 - Connection terminated. I 2016.04.05 22:30:20 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:30:20 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:30:23 - Checking authorization ... ! 2016.04.05 22:30:23 - Connecting to Tarazed (Netherlands, Alblasserdam) . 2016.04.05 22:30:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:30:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:30:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:30:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:30:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:30:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:30:23 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:30:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.132:443 [nonblock] . 2016.04.05 22:30:24 - OpenVPN > TCP connection established with [AF_INET]213.152.161.132:443 . 2016.04.05 22:30:24 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:30:24 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.132:443 . 2016.04.05 22:30:24 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.132:443, sid=6a9079a8 e809fefa . 2016.04.05 22:30:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:30:25 - OpenVPN > Validating certificate key usage . 2016.04.05 22:30:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:30:25 - OpenVPN > VERIFY KU OK . 2016.04.05 22:30:25 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:30:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:30:25 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:30:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:30:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:30:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:30:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:30:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:30:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:30:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.132:443 . 2016.04.05 22:30:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:30:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.15 255.255.0.0' . 2016.04.05 22:30:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:30:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:30:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:30:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:30:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:30:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:30:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:30:28 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:30:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:30:28 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:30:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.15/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:30:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.15/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:30:28 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:30:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:30:33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:30:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:30:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:30:33 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:30:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:30:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:30:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:30:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:30:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:30:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:30:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:30:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:30:33 - Starting Management Interface . 2016.04.05 22:30:33 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:30:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:30:33 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:30:33 - Flushing DNS I 2016.04.05 22:30:34 - Checking route W 2016.04.05 22:30:58 - Der Remotename konnte nicht aufgelöst werden: 'tarazed_exit.airservers.org' ! 2016.04.05 22:30:58 - Disconnecting . 2016.04.05 22:30:58 - Management - Send 'signal SIGTERM' . 2016.04.05 22:30:58 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:30:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:30:58 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.05 22:30:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:30:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:30:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:30:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:30:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:30:58 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:30:58 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:30:58 - Connection terminated. I 2016.04.05 22:30:58 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:30:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:31:01 - Checking authorization ... ! 2016.04.05 22:31:02 - Connecting to Tarazed (Netherlands, Alblasserdam) . 2016.04.05 22:31:02 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:31:02 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:31:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:31:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:31:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:02 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:31:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.132:443 [nonblock] . 2016.04.05 22:31:03 - OpenVPN > TCP connection established with [AF_INET]213.152.161.132:443 . 2016.04.05 22:31:03 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:31:03 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.132:443 . 2016.04.05 22:31:03 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.132:443, sid=e0999503 ebb59986 . 2016.04.05 22:31:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:31:03 - OpenVPN > Validating certificate key usage . 2016.04.05 22:31:03 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:31:03 - OpenVPN > VERIFY KU OK . 2016.04.05 22:31:03 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:31:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:31:03 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:31:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:31:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:31:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:31:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:31:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.132:443 . 2016.04.05 22:31:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:31:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.15 255.255.0.0' . 2016.04.05 22:31:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:31:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:31:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:31:06 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:31:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:31:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:31:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:31:06 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:31:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:31:07 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:31:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.15/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:31:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.15/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:31:07 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:31:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:11 - Starting Management Interface . 2016.04.05 22:31:11 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:31:11 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:31:11 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:31:11 - Flushing DNS I 2016.04.05 22:31:11 - Checking route W 2016.04.05 22:31:35 - Der Remotename konnte nicht aufgelöst werden: 'tarazed_exit.airservers.org' ! 2016.04.05 22:31:35 - Disconnecting . 2016.04.05 22:31:35 - Management - Send 'signal SIGTERM' . 2016.04.05 22:31:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:31:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:31:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:31:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:31:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:31:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:31:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:31:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:31:35 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:31:35 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:31:35 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:31:35 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:31:35 - Connection terminated. I 2016.04.05 22:31:36 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:31:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:31:39 - Checking authorization ... ! 2016.04.05 22:31:39 - Connecting to Zaniah (Sweden, Uppsala) . 2016.04.05 22:31:39 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:31:39 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:31:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:31:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:31:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:39 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:31:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.136:443 [nonblock] . 2016.04.05 22:31:40 - OpenVPN > TCP connection established with [AF_INET]62.102.148.136:443 . 2016.04.05 22:31:40 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:31:40 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]62.102.148.136:443 . 2016.04.05 22:31:40 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=e8eb1027 3fa1027c . 2016.04.05 22:31:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:31:40 - OpenVPN > Validating certificate key usage . 2016.04.05 22:31:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:31:40 - OpenVPN > VERIFY KU OK . 2016.04.05 22:31:40 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:31:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:31:40 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:31:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:31:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:31:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:31:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:31:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:31:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443 . 2016.04.05 22:31:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:31:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.3.217 255.255.0.0' . 2016.04.05 22:31:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:31:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:31:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:31:44 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:31:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:31:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:31:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:31:44 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:31:44 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:31:44 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:31:44 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.3.217/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:31:44 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.3.217/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:31:44 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:31:49 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:31:49 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.136 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:31:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:31:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:49 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:31:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:31:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:49 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:31:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:31:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:49 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:31:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:31:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:31:49 - Starting Management Interface . 2016.04.05 22:31:49 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:31:49 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:31:49 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:31:49 - Flushing DNS I 2016.04.05 22:31:50 - Checking route W 2016.04.05 22:32:14 - Der Remotename konnte nicht aufgelöst werden: 'zaniah_exit.airservers.org' ! 2016.04.05 22:32:14 - Disconnecting . 2016.04.05 22:32:14 - Management - Send 'signal SIGTERM' . 2016.04.05 22:32:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:32:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:32:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.136 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:32:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:32:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:32:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:32:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:14 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:32:14 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:32:14 - Connection terminated. I 2016.04.05 22:32:14 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:32:14 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:32:17 - Checking authorization ... ! 2016.04.05 22:32:17 - Connecting to Tarazed (Netherlands, Alblasserdam) . 2016.04.05 22:32:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:32:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:32:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:32:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:32:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:32:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:32:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:32:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.132:443 [nonblock] . 2016.04.05 22:32:19 - OpenVPN > TCP connection established with [AF_INET]213.152.161.132:443 . 2016.04.05 22:32:19 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:32:19 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.132:443 . 2016.04.05 22:32:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.132:443, sid=c1a7207f 4513c1a8 . 2016.04.05 22:32:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:32:19 - OpenVPN > Validating certificate key usage . 2016.04.05 22:32:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:32:19 - OpenVPN > VERIFY KU OK . 2016.04.05 22:32:19 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:32:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:32:19 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:32:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:32:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:32:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:32:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:32:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:32:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:32:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.132:443 . 2016.04.05 22:32:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:32:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.15 255.255.0.0' . 2016.04.05 22:32:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:32:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:32:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:32:22 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:32:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:32:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:32:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:32:22 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:32:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:32:22 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:32:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.15/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:32:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.15/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:32:22 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:32:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:32:27 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:32:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:32:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:32:27 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:32:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:32:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:32:27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:32:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:32:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:32:27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:32:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:32:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:32:27 - Starting Management Interface . 2016.04.05 22:32:27 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:32:27 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:32:27 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:32:27 - Flushing DNS I 2016.04.05 22:32:27 - Checking route W 2016.04.05 22:32:51 - Der Remotename konnte nicht aufgelöst werden: 'tarazed_exit.airservers.org' ! 2016.04.05 22:32:51 - Disconnecting . 2016.04.05 22:32:51 - Management - Send 'signal SIGTERM' . 2016.04.05 22:32:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:32:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:32:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:32:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:32:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:32:51 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:32:51 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.05 22:32:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:32:51 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:32:51 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:32:51 - Connection terminated. I 2016.04.05 22:32:52 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:32:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:32:52 - Cancel requested. I 2016.04.05 22:32:52 - IPv6 restored. ! 2016.04.05 22:32:52 - Session terminated. ! 2016.04.05 22:32:56 - Deactivation of Network Lock ! 2016.04.05 22:36:37 - Activation of Network Lock - Windows Firewall I 2016.04.05 22:36:47 - Session starting. I 2016.04.05 22:36:47 - IPv6 disabled. I 2016.04.05 22:36:47 - Checking authorization ... ! 2016.04.05 22:36:47 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.04.05 22:36:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:36:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:36:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:36:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:36:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:36:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:36:47 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:36:47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]109.232.227.132:443 [nonblock] . 2016.04.05 22:36:48 - OpenVPN > TCP connection established with [AF_INET]109.232.227.132:443 . 2016.04.05 22:36:48 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:36:48 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]109.232.227.132:443 . 2016.04.05 22:36:48 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=bfdafbc0 212c2ad9 . 2016.04.05 22:36:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:36:49 - OpenVPN > Validating certificate key usage . 2016.04.05 22:36:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:36:49 - OpenVPN > VERIFY KU OK . 2016.04.05 22:36:49 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:36:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:36:49 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:36:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:36:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:36:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:36:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:36:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:36:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:36:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.04.05 22:36:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:36:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.16 255.255.0.0' . 2016.04.05 22:36:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:36:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:36:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:36:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:36:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:36:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:36:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:36:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:36:52 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:36:52 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:36:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.16/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:36:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.16/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:36:52 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:36:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:36:57 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:36:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:36:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:36:57 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:36:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:36:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:36:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:36:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:36:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:36:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:36:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:36:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:36:57 - Starting Management Interface . 2016.04.05 22:36:57 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:36:57 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:36:57 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:36:57 - Flushing DNS I 2016.04.05 22:36:58 - Checking route W 2016.04.05 22:37:22 - Der Remotename konnte nicht aufgelöst werden: 'chara_exit.airservers.org' ! 2016.04.05 22:37:22 - Disconnecting . 2016.04.05 22:37:22 - Management - Send 'signal SIGTERM' . 2016.04.05 22:37:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:37:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:37:22 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.04.05 22:37:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:37:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:37:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:37:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:37:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:22 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:37:22 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:37:22 - Connection terminated. I 2016.04.05 22:37:22 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:37:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:37:25 - Checking authorization ... ! 2016.04.05 22:37:26 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.04.05 22:37:26 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:37:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:37:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:37:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:37:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:37:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:37:26 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:37:26 - OpenVPN > Attempting to establish TCP connection with [AF_INET]109.232.227.132:443 [nonblock] . 2016.04.05 22:37:27 - OpenVPN > TCP connection established with [AF_INET]109.232.227.132:443 . 2016.04.05 22:37:27 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:37:27 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]109.232.227.132:443 . 2016.04.05 22:37:27 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=2d0d1c97 88c93e32 . 2016.04.05 22:37:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:37:27 - OpenVPN > Validating certificate key usage . 2016.04.05 22:37:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:37:27 - OpenVPN > VERIFY KU OK . 2016.04.05 22:37:27 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:37:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:37:27 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:37:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:37:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:37:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:37:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:37:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:37:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:37:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.04.05 22:37:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:37:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.16 255.255.0.0' . 2016.04.05 22:37:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:37:30 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:37:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:37:30 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:37:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:37:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:37:30 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:37:30 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:37:30 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:37:30 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:37:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.16/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:37:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.16/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:37:30 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:37:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:37:35 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:37:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:37:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:37:35 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:37:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:37:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:37:35 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:37:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:37:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:37:35 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:37:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:37:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:37:35 - Starting Management Interface . 2016.04.05 22:37:35 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:37:35 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:37:35 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:37:35 - Flushing DNS I 2016.04.05 22:37:35 - Checking route W 2016.04.05 22:37:59 - Der Remotename konnte nicht aufgelöst werden: 'chara_exit.airservers.org' ! 2016.04.05 22:37:59 - Disconnecting . 2016.04.05 22:37:59 - Management - Send 'signal SIGTERM' . 2016.04.05 22:37:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:37:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:37:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:37:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:37:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:37:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:37:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:37:59 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:37:59 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:37:59 - Connection terminated. I 2016.04.05 22:38:00 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:38:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:38:03 - Checking authorization ... ! 2016.04.05 22:38:03 - Connecting to Kraz (Canada, Toronto, Ontario) . 2016.04.05 22:38:03 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:38:03 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:38:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:38:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:38:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:03 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:38:03 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.19.94.61:443 [nonblock] . 2016.04.05 22:38:04 - OpenVPN > TCP connection established with [AF_INET]199.19.94.61:443 . 2016.04.05 22:38:04 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:38:04 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.19.94.61:443 . 2016.04.05 22:38:04 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.61:443, sid=082bddc1 de62c4a5 . 2016.04.05 22:38:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:38:04 - OpenVPN > Validating certificate key usage . 2016.04.05 22:38:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:38:04 - OpenVPN > VERIFY KU OK . 2016.04.05 22:38:04 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:38:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:38:04 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:38:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:38:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:38:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:38:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:38:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.61:443 . 2016.04.05 22:38:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:38:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.180 255.255.0.0' . 2016.04.05 22:38:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:38:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:38:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:38:09 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:38:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:38:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:38:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:38:09 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:38:09 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:38:09 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:38:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.180/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:38:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.180/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:38:09 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:38:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:38:14 - OpenVPN > C:\Windows\system32\route.exe ADD 199.19.94.61 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:38:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:38:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:14 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:38:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:38:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:38:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:38:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:38:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:38:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:14 - Starting Management Interface . 2016.04.05 22:38:14 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:38:14 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:38:14 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:38:14 - Flushing DNS I 2016.04.05 22:38:14 - Checking route W 2016.04.05 22:38:38 - Der Remotename konnte nicht aufgelöst werden: 'kraz_exit.airservers.org' ! 2016.04.05 22:38:38 - Disconnecting . 2016.04.05 22:38:38 - Management - Send 'signal SIGTERM' . 2016.04.05 22:38:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:38:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:38:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 199.19.94.61 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:38:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:38:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:38:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:38:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:38:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:38:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:38:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:38:38 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:38:38 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:38:38 - Connection terminated. I 2016.04.05 22:38:39 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:38:39 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:38:42 - Checking authorization ... ! 2016.04.05 22:38:42 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.04.05 22:38:42 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:38:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:38:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:38:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:38:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:42 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:38:42 - OpenVPN > Attempting to establish TCP connection with [AF_INET]109.232.227.132:443 [nonblock] . 2016.04.05 22:38:43 - OpenVPN > TCP connection established with [AF_INET]109.232.227.132:443 . 2016.04.05 22:38:43 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.04.05 22:38:43 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]109.232.227.132:443 . 2016.04.05 22:38:43 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=60242774 ff157d88 . 2016.04.05 22:38:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:38:43 - OpenVPN > Validating certificate key usage . 2016.04.05 22:38:43 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:38:43 - OpenVPN > VERIFY KU OK . 2016.04.05 22:38:43 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:38:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:38:43 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:38:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:38:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:38:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:38:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:38:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:38:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.04.05 22:38:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:38:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.16 255.255.0.0' . 2016.04.05 22:38:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:38:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:38:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:38:46 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:38:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:38:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:38:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:38:46 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:38:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:38:47 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:38:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.16/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:38:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.16/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.04.05 22:38:47 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:38:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:38:51 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:38:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:38:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:51 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:38:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:38:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:38:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:38:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:38:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:38:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:38:51 - Starting Management Interface . 2016.04.05 22:38:51 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:38:51 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:38:51 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:38:51 - Flushing DNS I 2016.04.05 22:38:51 - Checking route W 2016.04.05 22:39:15 - Der Remotename konnte nicht aufgelöst werden: 'chara_exit.airservers.org' ! 2016.04.05 22:39:15 - Disconnecting . 2016.04.05 22:39:15 - Management - Send 'signal SIGTERM' . 2016.04.05 22:39:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:39:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:39:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:39:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:39:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:39:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:39:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:39:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:39:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.04.05 22:39:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:39:15 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:39:15 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.04.05 22:39:15 - Connection terminated. I 2016.04.05 22:39:16 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:39:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:39:19 - Checking authorization ... ! 2016.04.05 22:39:19 - Connecting to Chara (Netherlands, Alblasserdam) . 2016.04.05 22:39:19 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.04.05 22:39:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.04.05 22:39:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.04.05 22:39:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.04.05 22:39:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:39:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:39:19 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.04.05 22:39:19 - OpenVPN > UDPv4 link local: [undef] . 2016.04.05 22:39:19 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.132:443 . 2016.04.05 22:39:19 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=beef3cd5 a3574124 . 2016.04.05 22:39:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.04.05 22:39:19 - OpenVPN > Validating certificate key usage . 2016.04.05 22:39:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.04.05 22:39:19 - OpenVPN > VERIFY KU OK . 2016.04.05 22:39:19 - OpenVPN > Validating certificate extended key usage . 2016.04.05 22:39:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.04.05 22:39:19 - OpenVPN > VERIFY EKU OK . 2016.04.05 22:39:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.04.05 22:39:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:39:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:39:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.04.05 22:39:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.04.05 22:39:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.04.05 22:39:22 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2016.04.05 22:39:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.04.05 22:39:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.8 255.255.0.0' . 2016.04.05 22:39:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.04.05 22:39:25 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.04.05 22:39:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.04.05 22:39:25 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.04.05 22:39:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.04.05 22:39:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.04.05 22:39:25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.04.05 22:39:25 - OpenVPN > open_tun, tt->ipv6=0 . 2016.04.05 22:39:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4FB24F29-E9D9-4714-94CB-4F3F76EEC41E}.tap . 2016.04.05 22:39:25 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.04.05 22:39:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.8/255.255.0.0 [SUCCEEDED] . 2016.04.05 22:39:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.8/255.255.0.0 on interface {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.04.05 22:39:25 - OpenVPN > Successful ARP Flush on interface [4] {4FB24F29-E9D9-4714-94CB-4F3F76EEC41E} . 2016.04.05 22:39:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.04.05 22:39:30 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:39:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:39:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:39:30 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2 . 2016.04.05 22:39:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2016.04.05 22:39:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:39:30 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.05 22:39:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:39:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:39:30 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.05 22:39:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.04.05 22:39:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.04.05 22:39:30 - Starting Management Interface . 2016.04.05 22:39:30 - OpenVPN > Initialization Sequence Completed I 2016.04.05 22:39:30 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller) I 2016.04.05 22:39:30 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.04.05 22:39:31 - Flushing DNS . 2016.04.05 22:39:31 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 266 ms I 2016.04.05 22:39:31 - Checking route W 2016.04.05 22:39:55 - Der Remotename konnte nicht aufgelöst werden: 'chara_exit.airservers.org' ! 2016.04.05 22:39:55 - Disconnecting . 2016.04.05 22:39:55 - Management - Send 'signal SIGTERM' . 2016.04.05 22:39:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.04.05 22:39:55 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.04.05 22:39:55 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.04.05 22:40:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:40:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:40:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.04.05 22:40:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:40:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.05 22:40:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:40:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.04.05 22:40:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.04.05 22:40:00 - OpenVPN > Closing TUN/TAP interface . 2016.04.05 22:40:00 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.04.05 22:40:00 - Connection terminated. I 2016.04.05 22:40:00 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller) I 2016.04.05 22:40:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.04.05 22:40:00 - Cancel requested. I 2016.04.05 22:40:00 - IPv6 restored. . 2016.04.05 22:40:00 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 187 ms ! 2016.04.05 22:40:00 - Session terminated. ! 2016.04.05 22:40:45 - Deactivation of Network Lock . 2016.04.05 22:40:46 - Shell of 'cmd.exe','/c netsh advfirewall set domain firewallpolicy ,' done sync in 360 ms . 2016.04.05 22:40:46 - Shell of 'cmd.exe','/c netsh advfirewall set private firewallpolicy ,' done sync in 234 ms . 2016.04.05 22:40:46 - Shell of 'cmd.exe','/c netsh advfirewall set public firewallpolicy ,' done sync in 234 ms . 2016.04.05 22:40:49 - Shell of 'cmd.exe','/c netsh advfirewall import "C:\Users\gerha\AppData\Local\AirVPN\winfirewall_rules_backup.wfw"' done sync in 2625 ms . 2016.04.05 22:40:49 - Shell of 'cmd.exe','/c netsh advfirewall set domain state off' done sync in 297 ms . 2016.04.05 22:40:49 - Shell of 'cmd.exe','/c netsh advfirewall set private state off' done sync in 297 ms . 2016.04.05 22:40:49 - Shell of 'cmd.exe','/c netsh advfirewall set public state off' done sync in 235 ms Quote Share this post Link to post
zhang888 1066 Posted ... What happens when you try to manually resolvetarazed_exit.airservers.org and zaniah_exit.airservers.org ?For example, try to ping these hosts. What DNS servers are you using in your network adapter? Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
OpenSourcerer 1442 Posted ... Have a look at Cannot log on to any servers. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post