User of AirVPN 47 Posted ... Hello! Recently I have been enjoying AirVPN, while having a 25Mbps Download/25Mbps Upload Fiber connection with Verizon FiOS.I was getting relatively good speeds, usually around 22 or 23 Mbps while connected to AirVPN, which was very good.However, this changed when, on Tuesday, I upgraded my internet speed from 25 Download/25 Upload to 50 Download/50 Upload. My speeds while not connected to AirVPN significantly increased. However, my speeds when connected to AirVPN only rose by 1 to 2 Mbps. I would like to find out why there is such a big difference between my speed while connected to AirVPN and my speed while not connected to AirVPN. I don't think this is the fault of any of the Air servers I am using, as they all support 1Gbps. I have included some speedtest.net results below, if it helps. Internet Speed while not connected to AirVPN Internet Speed while connected to AirVPN (UDP 443)(for this test, I was using Zosma, but other servers that I tried yielded similar results) I have also included the Eddie client's logs, if they are needed I 2016.04.07 16:08:54 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.04.07 16:08:54 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2016.04.07 16:09:01 - Data Path: C:\Program Files\AirVPN. 2016.04.07 16:09:01 - App Path: C:\Program Files\AirVPN. 2016.04.07 16:09:01 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.04.07 16:09:01 - Command line arguments (0):. 2016.04.07 16:09:01 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.04.07 16:09:01 - Updating systems & servers data .... 2016.04.07 16:09:03 - Systems & servers data update completedI 2016.04.07 16:09:03 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2I 2016.04.07 16:09:03 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.04.07 16:09:03 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.04.07 16:09:03 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)W 2016.04.07 16:09:04 - Recovery. Unexpected crash?! 2016.04.07 16:09:04 - Deactivation of Network Lock! 2016.04.07 16:09:10 - Activation of Network Lock - Windows Firewall! 2016.04.07 16:11:07 - ReadyI 2016.04.07 16:20:57 - Session starting.I 2016.04.07 16:20:58 - IPv6 disabled.I 2016.04.07 16:20:59 - Checking authorization ...! 2016.04.07 16:20:59 - Connecting to Rasalas (United States, Newark, New Jersey). 2016.04.07 16:21:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.04.07 16:21:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.07 16:21:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.04.07 16:21:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.04.07 16:21:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:21:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:21:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072]. 2016.04.07 16:21:01 - OpenVPN > UDPv4 link local: [undef]. 2016.04.07 16:21:01 - OpenVPN > UDPv4 link remote: [AF_INET]64.120.44.138:443. 2016.04.07 16:21:01 - OpenVPN > TLS: Initial packet from [AF_INET]64.120.44.138:443, sid=16b9c059 06d689a9. 2016.04.07 16:21:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.04.07 16:21:01 - OpenVPN > Validating certificate key usage. 2016.04.07 16:21:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.04.07 16:21:01 - OpenVPN > VERIFY KU OK. 2016.04.07 16:21:01 - OpenVPN > Validating certificate extended key usage. 2016.04.07 16:21:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.04.07 16:21:01 - OpenVPN > VERIFY EKU OK. 2016.04.07 16:21:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.04.07 16:21:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:21:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:21:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:21:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:21:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.04.07 16:21:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]64.120.44.138:443. 2016.04.07 16:21:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.04.07 16:21:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.28 255.255.0.0'. 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.04.07 16:21:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.04.07 16:21:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.04.07 16:21:08 - OpenVPN > open_tun, tt->ipv6=0. 2016.04.07 16:21:09 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap. 2016.04.07 16:21:09 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.04.07 16:21:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.28/255.255.0.0 [sUCCEEDED]. 2016.04.07 16:21:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.28/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.04.07 16:21:09 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E}. 2016.04.07 16:21:14 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down. 2016.04.07 16:21:14 - OpenVPN > Route: Waiting for TUN/TAP interface to come up.... 2016.04.07 16:21:14 - AirVPN Windows Interface Hack executed (Ethernet 2). 2016.04.07 16:21:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.04.07 16:21:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.120.44.138 MASK 255.255.255.255 10.10.10.1. 2016.04.07 16:21:20 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 16:21:20 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.04.07 16:21:20 - OpenVPN > Route addition fallback to route.exe. 2016.04.07 16:21:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 16:21:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:21:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:21:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:21:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:21:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:21:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:21:20 - Starting Management Interface. 2016.04.07 16:21:20 - OpenVPN > Initialization Sequence CompletedI 2016.04.07 16:21:20 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.04.07 16:21:20 - DNS of a network adapter forced (Realtek PCIe FE Family Controller)I 2016.04.07 16:21:20 - Flushing DNSI 2016.04.07 16:21:21 - Checking routeI 2016.04.07 16:21:33 - Checking DNS! 2016.04.07 16:21:35 - Connected.. 2016.04.07 16:21:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.04.07 16:21:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.04.07 16:29:56 - Disconnecting. 2016.04.07 16:29:56 - Management - Send 'signal SIGTERM'. 2016.04.07 16:29:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.04.07 16:29:56 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.04.07 16:30:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.120.44.138 MASK 255.255.255.255 10.10.10.1. 2016.04.07 16:30:01 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 16:30:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.04.07 16:30:01 - OpenVPN > Route deletion fallback to route.exe. 2016.04.07 16:30:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 16:30:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:30:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 16:30:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:30:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 16:30:01 - OpenVPN > Closing TUN/TAP interface. 2016.04.07 16:30:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.04.07 16:30:01 - Connection terminated.I 2016.04.07 16:30:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.04.07 16:30:02 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller)I 2016.04.07 16:30:05 - Checking authorization ...! 2016.04.07 16:30:05 - Connecting to Alhena (Canada, Toronto, Ontario). 2016.04.07 16:30:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.04.07 16:30:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.07 16:30:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.04.07 16:30:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.04.07 16:30:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:30:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:30:06 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072]. 2016.04.07 16:30:06 - OpenVPN > UDPv4 link local: [undef]. 2016.04.07 16:30:06 - OpenVPN > UDPv4 link remote: [AF_INET]162.219.176.2:443. 2016.04.07 16:30:06 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=abd7407d 2173389b. 2016.04.07 16:30:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.04.07 16:30:06 - OpenVPN > Validating certificate key usage. 2016.04.07 16:30:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.04.07 16:30:06 - OpenVPN > VERIFY KU OK. 2016.04.07 16:30:06 - OpenVPN > Validating certificate extended key usage. 2016.04.07 16:30:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.04.07 16:30:06 - OpenVPN > VERIFY EKU OK. 2016.04.07 16:30:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.04.07 16:30:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:30:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:30:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:30:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:30:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.04.07 16:30:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443. 2016.04.07 16:30:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.04.07 16:30:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.50.189 255.255.0.0'. 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.04.07 16:30:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.04.07 16:30:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.04.07 16:30:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.04.07 16:30:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap. 2016.04.07 16:30:12 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.04.07 16:30:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.50.189/255.255.0.0 [sUCCEEDED]. 2016.04.07 16:30:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.189/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.04.07 16:30:12 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E}. 2016.04.07 16:30:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down. 2016.04.07 16:30:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up.... 2016.04.07 16:30:17 - AirVPN Windows Interface Hack executed (Ethernet 2). 2016.04.07 16:30:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.04.07 16:30:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 162.219.176.2 MASK 255.255.255.255 10.10.10.1. 2016.04.07 16:30:21 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 16:30:21 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.04.07 16:30:21 - OpenVPN > Route addition fallback to route.exe. 2016.04.07 16:30:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 16:30:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:30:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:30:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:30:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:30:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:30:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:30:21 - Starting Management Interface. 2016.04.07 16:30:21 - OpenVPN > Initialization Sequence CompletedI 2016.04.07 16:30:21 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.04.07 16:30:21 - DNS of a network adapter forced (Realtek PCIe FE Family Controller)I 2016.04.07 16:30:21 - Flushing DNSI 2016.04.07 16:30:21 - Checking routeI 2016.04.07 16:30:47 - Checking DNS! 2016.04.07 16:30:48 - Connected.. 2016.04.07 16:30:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.04.07 16:30:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.04.07 16:38:18 - Disconnecting. 2016.04.07 16:38:18 - Management - Send 'signal SIGTERM'. 2016.04.07 16:38:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.04.07 16:38:18 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.04.07 16:38:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 162.219.176.2 MASK 255.255.255.255 10.10.10.1. 2016.04.07 16:38:23 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 16:38:23 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.04.07 16:38:23 - OpenVPN > Route deletion fallback to route.exe. 2016.04.07 16:38:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 16:38:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:38:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 16:38:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:38:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 16:38:23 - OpenVPN > Closing TUN/TAP interface. 2016.04.07 16:38:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.04.07 16:38:23 - Connection terminated.I 2016.04.07 16:38:23 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.04.07 16:38:24 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller)I 2016.04.07 16:38:27 - Checking authorization ...! 2016.04.07 16:38:27 - Connecting to Zosma (United States, New York City). 2016.04.07 16:38:27 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.04.07 16:38:27 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.07 16:38:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.04.07 16:38:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.04.07 16:38:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:38:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:38:27 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072]. 2016.04.07 16:38:27 - OpenVPN > UDPv4 link local: [undef]. 2016.04.07 16:38:27 - OpenVPN > UDPv4 link remote: [AF_INET]23.105.129.218:443. 2016.04.07 16:38:27 - OpenVPN > TLS: Initial packet from [AF_INET]23.105.129.218:443, sid=c7b765be 8c0305df. 2016.04.07 16:38:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.04.07 16:38:28 - OpenVPN > Validating certificate key usage. 2016.04.07 16:38:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.04.07 16:38:28 - OpenVPN > VERIFY KU OK. 2016.04.07 16:38:28 - OpenVPN > Validating certificate extended key usage. 2016.04.07 16:38:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.04.07 16:38:28 - OpenVPN > VERIFY EKU OK. 2016.04.07 16:38:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.04.07 16:38:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:38:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:38:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:38:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:38:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.04.07 16:38:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]23.105.129.218:443. 2016.04.07 16:38:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.04.07 16:38:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.209 255.255.0.0'. 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.04.07 16:38:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.04.07 16:38:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.04.07 16:38:36 - OpenVPN > open_tun, tt->ipv6=0. 2016.04.07 16:38:36 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap. 2016.04.07 16:38:36 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.04.07 16:38:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.209/255.255.0.0 [sUCCEEDED]. 2016.04.07 16:38:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.209/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.04.07 16:38:36 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E}. 2016.04.07 16:38:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down. 2016.04.07 16:38:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up.... 2016.04.07 16:38:41 - AirVPN Windows Interface Hack executed (Ethernet 2). 2016.04.07 16:38:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.04.07 16:38:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 23.105.129.218 MASK 255.255.255.255 10.10.10.1. 2016.04.07 16:38:46 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 16:38:46 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.04.07 16:38:46 - OpenVPN > Route addition fallback to route.exe. 2016.04.07 16:38:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 16:38:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:38:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:38:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:38:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:38:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:38:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:38:46 - Starting Management Interface. 2016.04.07 16:38:46 - OpenVPN > Initialization Sequence CompletedI 2016.04.07 16:38:46 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.04.07 16:38:46 - DNS of a network adapter forced (Realtek PCIe FE Family Controller)I 2016.04.07 16:38:46 - Flushing DNSI 2016.04.07 16:38:46 - Checking routeI 2016.04.07 16:39:10 - Checking DNS! 2016.04.07 16:39:11 - Connected.. 2016.04.07 16:39:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.04.07 16:39:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.04.07 16:39:20 - Updating systems & servers data .... 2016.04.07 16:39:21 - Systems & servers data update completed! 2016.04.07 16:44:42 - Disconnecting. 2016.04.07 16:44:42 - Management - Send 'signal SIGTERM'. 2016.04.07 16:44:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.04.07 16:44:42 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.04.07 16:44:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 23.105.129.218 MASK 255.255.255.255 10.10.10.1. 2016.04.07 16:44:47 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 16:44:47 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.04.07 16:44:47 - OpenVPN > Route deletion fallback to route.exe. 2016.04.07 16:44:47 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 16:44:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:44:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 16:44:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:44:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 16:44:47 - OpenVPN > Closing TUN/TAP interface. 2016.04.07 16:44:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.04.07 16:44:47 - Connection terminated.I 2016.04.07 16:44:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.04.07 16:44:48 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller)I 2016.04.07 16:44:51 - Checking authorization ...! 2016.04.07 16:44:51 - Connecting to Miaplacidus (United States, Newark, New Jersey). 2016.04.07 16:44:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.04.07 16:44:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.07 16:44:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.04.07 16:44:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.04.07 16:44:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:44:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:44:52 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072]. 2016.04.07 16:44:52 - OpenVPN > UDPv4 link local: [undef]. 2016.04.07 16:44:52 - OpenVPN > UDPv4 link remote: [AF_INET]173.234.159.194:443. 2016.04.07 16:44:52 - OpenVPN > TLS: Initial packet from [AF_INET]173.234.159.194:443, sid=cfa05f68 314bda29. 2016.04.07 16:44:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.04.07 16:44:52 - OpenVPN > Validating certificate key usage. 2016.04.07 16:44:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.04.07 16:44:52 - OpenVPN > VERIFY KU OK. 2016.04.07 16:44:52 - OpenVPN > Validating certificate extended key usage. 2016.04.07 16:44:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.04.07 16:44:52 - OpenVPN > VERIFY EKU OK. 2016.04.07 16:44:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.04.07 16:44:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:44:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:44:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 16:44:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 16:44:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.04.07 16:44:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.234.159.194:443. 2016.04.07 16:44:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.04.07 16:44:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.20 255.255.0.0'. 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.04.07 16:44:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.04.07 16:44:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.04.07 16:44:54 - OpenVPN > open_tun, tt->ipv6=0. 2016.04.07 16:44:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap. 2016.04.07 16:44:55 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.04.07 16:44:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.20/255.255.0.0 [sUCCEEDED]. 2016.04.07 16:44:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.20/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.04.07 16:44:55 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E}. 2016.04.07 16:45:00 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down. 2016.04.07 16:45:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up.... 2016.04.07 16:45:00 - AirVPN Windows Interface Hack executed (Ethernet 2). 2016.04.07 16:45:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.04.07 16:45:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 173.234.159.194 MASK 255.255.255.255 10.10.10.1. 2016.04.07 16:45:05 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 16:45:05 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.04.07 16:45:05 - OpenVPN > Route addition fallback to route.exe. 2016.04.07 16:45:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 16:45:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:45:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:45:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:45:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 16:45:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 16:45:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 16:45:05 - Starting Management Interface. 2016.04.07 16:45:05 - OpenVPN > Initialization Sequence CompletedI 2016.04.07 16:45:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.04.07 16:45:05 - DNS of a network adapter forced (Realtek PCIe FE Family Controller)I 2016.04.07 16:45:05 - Flushing DNSI 2016.04.07 16:45:05 - Checking routeI 2016.04.07 16:45:28 - Checking DNS! 2016.04.07 16:45:29 - Connected.. 2016.04.07 16:45:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.04.07 16:45:29 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.04.07 17:09:32 - Updating systems & servers data .... 2016.04.07 17:09:33 - Systems & servers data update completed. 2016.04.07 17:40:20 - Updating systems & servers data .... 2016.04.07 17:40:21 - Systems & servers data update completed. 2016.04.07 17:44:52 - OpenVPN > TLS: soft reset sec=0 bytes=688570945/0 pkts=798085/0. 2016.04.07 17:44:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.04.07 17:44:52 - OpenVPN > Validating certificate key usage. 2016.04.07 17:44:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.04.07 17:44:52 - OpenVPN > VERIFY KU OK. 2016.04.07 17:44:52 - OpenVPN > Validating certificate extended key usage. 2016.04.07 17:44:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.04.07 17:44:52 - OpenVPN > VERIFY EKU OK. 2016.04.07 17:44:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.04.07 17:44:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 17:44:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 17:44:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 17:44:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 17:44:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.04.07 18:10:29 - Updating systems & servers data .... 2016.04.07 18:10:31 - Systems & servers data update completed! 2016.04.07 18:20:03 - Disconnecting. 2016.04.07 18:20:03 - Management - Send 'signal SIGTERM'. 2016.04.07 18:20:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.04.07 18:20:04 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.04.07 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 173.234.159.194 MASK 255.255.255.255 10.10.10.1. 2016.04.07 18:20:08 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 18:20:08 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.04.07 18:20:08 - OpenVPN > Route deletion fallback to route.exe. 2016.04.07 18:20:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 18:20:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 18:20:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 18:20:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.04.07 18:20:08 - OpenVPN > Closing TUN/TAP interface. 2016.04.07 18:20:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.04.07 18:20:12 - Connection terminated.I 2016.04.07 18:20:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.04.07 18:20:19 - DNS of a network adapter restored to original settings (Realtek PCIe FE Family Controller)I 2016.04.07 18:20:19 - IPv6 restored.! 2016.04.07 18:20:20 - Session terminated.I 2016.04.07 18:31:43 - Session starting.I 2016.04.07 18:31:44 - IPv6 disabled.I 2016.04.07 18:31:44 - Checking authorization ...! 2016.04.07 18:31:44 - Connecting to Zosma (United States, New York City). 2016.04.07 18:31:45 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.04.07 18:31:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.07 18:31:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.04.07 18:31:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.04.07 18:31:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 18:31:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 18:31:45 - OpenVPN > Socket Buffers: R=[65536->131072] S=[261360->131072]. 2016.04.07 18:31:45 - OpenVPN > UDPv4 link local: [undef]. 2016.04.07 18:31:45 - OpenVPN > UDPv4 link remote: [AF_INET]23.105.129.218:443. 2016.04.07 18:31:45 - OpenVPN > TLS: Initial packet from [AF_INET]23.105.129.218:443, sid=39564e90 95441f76. 2016.04.07 18:31:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.04.07 18:31:46 - OpenVPN > Validating certificate key usage. 2016.04.07 18:31:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.04.07 18:31:46 - OpenVPN > VERIFY KU OK. 2016.04.07 18:31:46 - OpenVPN > Validating certificate extended key usage. 2016.04.07 18:31:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.04.07 18:31:46 - OpenVPN > VERIFY EKU OK. 2016.04.07 18:31:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.04.07 18:31:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 18:31:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 18:31:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.04.07 18:31:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.04.07 18:31:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.04.07 18:31:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]23.105.129.218:443. 2016.04.07 18:31:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.04.07 18:31:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.209 255.255.0.0'. 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.04.07 18:31:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.04.07 18:31:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.04.07 18:31:58 - OpenVPN > open_tun, tt->ipv6=0. 2016.04.07 18:31:58 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C2CBD907-CC75-4CDE-B870-A9640045093E}.tap. 2016.04.07 18:31:58 - OpenVPN > TAP-Windows Driver Version 9.9. 2016.04.07 18:31:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.209/255.255.0.0 [sUCCEEDED]. 2016.04.07 18:31:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.209/255.255.0.0 on interface {C2CBD907-CC75-4CDE-B870-A9640045093E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.04.07 18:31:58 - OpenVPN > Successful ARP Flush on interface [16] {C2CBD907-CC75-4CDE-B870-A9640045093E}. 2016.04.07 18:32:03 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down. 2016.04.07 18:32:03 - OpenVPN > Route: Waiting for TUN/TAP interface to come up.... 2016.04.07 18:32:03 - AirVPN Windows Interface Hack executed (Ethernet 2). 2016.04.07 18:32:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.04.07 18:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 23.105.129.218 MASK 255.255.255.255 10.10.10.1. 2016.04.07 18:32:08 - OpenVPN > Warning: route gateway is ambiguous: 10.10.10.1 (2 matches). 2016.04.07 18:32:08 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.04.07 18:32:08 - OpenVPN > Route addition fallback to route.exe. 2016.04.07 18:32:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.04.07 18:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 18:32:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 18:32:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 18:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.04.07 18:32:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2016.04.07 18:32:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.04.07 18:32:08 - Starting Management Interface. 2016.04.07 18:32:08 - OpenVPN > Initialization Sequence CompletedI 2016.04.07 18:32:08 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.04.07 18:32:08 - DNS of a network adapter forced (Realtek PCIe FE Family Controller)I 2016.04.07 18:32:09 - Flushing DNSI 2016.04.07 18:32:09 - Checking routeI 2016.04.07 18:32:44 - Checking DNS! 2016.04.07 18:32:45 - Connected.. 2016.04.07 18:32:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.04.07 18:32:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.04.07 18:40:59 - Updating systems & servers data .... 2016.04.07 18:41:01 - Systems & servers data update completed Quote Share this post Link to post
zhang888 1066 Posted ... Try to set the socket buffers to 256KB in the advanced section of Eddie. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
User of AirVPN 47 Posted ... Try to set the socket buffers to 256KB in the advanced section of Eddie.Just did this and did another speedtest.The speed went down to 13.67 Download, 9.37 Upload. Quote Share this post Link to post
zhang888 1066 Posted ... Try the internal speedtest as well, here:https://airvpn.org/speedtest/ Also you should try other connection modes, for example TCP 443, and TCP over SSL. 1 User of AirVPN reacted to this Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
go558a83nk 364 Posted ... and try different servers. routing makes all the difference. Quote Share this post Link to post