Jump to content
Not connected, Your IP: 18.225.54.199
Sign in to follow this  
bobs

Suddenly, [server] Inactivity timeout (--ping-restart), restarting, every few minutes.

Recommended Posts

Edit: OK sorry for the quick rambling post but I was just writing things as I noticed them. Everything is working OK again now.

 

I am almost 100% sure that 2 of my connections were being recognised as the same connection somehow. When I force disconnected my devices from the client page and connected them all again, everything started working just fine and 3 separate connections are now showing in the client page (as noted at the bottom of the post, only 2 connections were showing in the client area despite having 3 devices connected and active).

 

This was mainly happening on my 2 android devices- every time I made any activity on the 1st device, the 2nd device's connection timed out and reconnected, and then when that one reconnected, the 1st device would then time out and reconnect. I don't know much more than this, surely it cannot just have been a coincidence though, right?

---

 

So suddenly last night, on two separate Android devices using OpenVPN for Android and also on my Windows machine using Eddie (albeit less often here) I am constantly getting my VPN connection restarted with relation to that message in the logs.

 

Like I said, I first noticed this on both my android devices; Every few minutes my connection would drop and restart. This was happening on my home broadband connection so I switched to LTE in case it was something on my end making me drop connection, and it was still doing the same.

 

Today it is still doing the same.

 

I checked the logs and I have been getting that [server] Inactivity timeout (--ping-restart), restarting message over and over.

 

It has only done it once since I got on my Desktop today, here is that part of the log

. 2016.04.12 09:05:22 - Updating systems & servers data ...
. 2016.04.12 09:05:22 - Systems & servers data update completed
I 2016.04.12 09:06:36 - Renewing TLS key
. 2016.04.12 09:06:36 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.04.12 09:06:37 - OpenVPN > TLS: soft reset sec=0 bytes=3283445/0 pkts=12057/0
. 2016.04.12 09:06:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.12 09:06:37 - OpenVPN > Validating certificate key usage
. 2016.04.12 09:06:37 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.04.12 09:06:37 - OpenVPN > VERIFY KU OK
. 2016.04.12 09:06:37 - OpenVPN > Validating certificate extended key usage
. 2016.04.12 09:06:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.12 09:06:37 - OpenVPN > VERIFY EKU OK
. 2016.04.12 09:06:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.12 09:06:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.12 09:06:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.12 09:06:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.12 09:06:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.12 09:06:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA


. 2016.04.12 09:27:23 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.04.12 09:27:23 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.04.12 09:27:23 - OpenVPN > Restart pause, 2 second(s)
! 2016.04.12 09:27:23 - Disconnecting
. 2016.04.12 09:27:23 - Management - Send 'signal SIGTERM'
. 2016.04.12 09:27:23 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.12 09:27:23 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.04.12 09:27:23 - OpenVPN > Assertion failed at misc.c:779
. 2016.04.12 09:27:23 - OpenVPN > Exiting due to fatal error
. 2016.04.12 09:27:23 - Connection terminated.
I 2016.04.12 09:27:23 - DNS of a network adapter restored to original settings (Intel(R) 82579V Gigabit Network Connection)
I 2016.04.12 09:27:23 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.04.12 09:27:32 - Checking authorization ...
! 2016.04.12 09:27:38 - Connecting to Algedi (United Kingdom, London)
. 2016.04.12 09:27:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.04.12 09:27:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.12 09:27:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.12 09:27:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.12 09:27:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.12 09:27:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.12 09:27:38 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.04.12 09:27:38 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.12 09:27:38 - OpenVPN > UDPv4 link remote: [AF_INET]80.84.49.4:443
. 2016.04.12 09:27:38 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=bc1ea769 6f6f303f
. 2016.04.12 09:27:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.12 09:27:38 - OpenVPN > Validating certificate key usage
. 2016.04.12 09:27:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.04.12 09:27:38 - OpenVPN > VERIFY KU OK
. 2016.04.12 09:27:38 - OpenVPN > Validating certificate extended key usage
. 2016.04.12 09:27:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.12 09:27:38 - OpenVPN > VERIFY EKU OK
. 2016.04.12 09:27:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.12 09:27:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.12 09:27:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.12 09:27:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.12 09:27:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.12 09:27:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.12 09:27:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443
. 2016.04.12 09:27:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.12 09:27:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.47 255.255.0.0'
. 2016.04.12 09:27:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.12 09:27:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.12 09:27:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.12 09:27:41 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.12 09:27:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.12 09:27:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.12 09:27:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.12 09:27:41 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.12 09:27:41 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{CA0E380E-2235-4ACA-A3EE-D8690841A503}.tap
. 2016.04.12 09:27:41 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.04.12 09:27:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.47/255.255.0.0 [SUCCEEDED]
. 2016.04.12 09:27:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.47/255.255.0.0 on interface {CA0E380E-2235-4ACA-A3EE-D8690841A503} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.04.12 09:27:41 - OpenVPN > Successful ARP Flush on interface [17] {CA0E380E-2235-4ACA-A3EE-D8690841A503}
. 2016.04.12 09:27:41 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065)
. 2016.04.12 09:27:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.04.12 09:27:46 - OpenVPN > C:\Windows\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1
. 2016.04.12 09:27:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.04.12 09:27:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.12 09:27:46 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 12
. 2016.04.12 09:27:46 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.04.12 09:27:46 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.04.12 09:27:46 - OpenVPN > Route addition fallback to route.exe
. 2016.04.12 09:27:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.04.12 09:27:46 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.12 09:27:46 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.04.12 09:27:46 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.04.12 09:27:46 - OpenVPN > Route addition fallback to route.exe
. 2016.04.12 09:27:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.04.12 09:27:46 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.12 09:27:46 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.04.12 09:27:46 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.04.12 09:27:46 - OpenVPN > Route addition fallback to route.exe
. 2016.04.12 09:27:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.04.12 09:27:46 - Starting Management Interface
. 2016.04.12 09:27:46 - OpenVPN > Initialization Sequence Completed
I 2016.04.12 09:27:46 - DNS of a network adapter forced (Intel(R) 82579V Gigabit Network Connection)
I 2016.04.12 09:27:46 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.04.12 09:27:46 - Flushing DNS
I 2016.04.12 09:27:46 - Checking route
I 2016.04.12 09:27:46 - Checking DNS
! 2016.04.12 09:27:46 - Connected.
. 2016.04.12 09:27:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.04.12 09:27:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

 

And the logs from my android devices look like this:

 

2016-04-12 09:40:32 [server] Inactivity timeout (--ping-restart), restarting

2016-04-12 09:40:32 TCP/UDP: Closing socket

2016-04-12 09:40:32 SIGUSR1[soft,ping-restart] received, process restarting

2016-04-12 09:40:32 MANAGEMENT: >STATE:1460450432,RECONNECTING,ping-restart,,,,,

2016-04-12 09:40:32 MANAGEMENT: CMD 'hold release'

2016-04-12 09:40:32 MANAGEMENT: CMD 'bytecount 2'

2016-04-12 09:40:32 MANAGEMENT: CMD 'state on'

2016-04-12 09:40:32 MANAGEMENT: CMD 'proxy NONE'

2016-04-12 09:40:33 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:40:33 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:40:33 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2016-04-12 09:40:33 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:395 ET:0 EL:3 ]

2016-04-12 09:40:33 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2016-04-12 09:40:33 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2016-04-12 09:40:33 TCP/UDP: Preserving recently used remote address: [AF_INET]82.145.37.202:443

2016-04-12 09:40:33 Socket Buffers: R=[163840->163840] S=[163840->163840]

2016-04-12 09:40:33 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2016-04-12 09:40:33 UDP link local: (not bound)

2016-04-12 09:40:33 UDP link remote: [AF_INET]82.145.37.202:443

2016-04-12 09:40:33 MANAGEMENT: >STATE:1460450433,WAIT,,,,,,

2016-04-12 09:40:33 MANAGEMENT: >STATE:1460450433,AUTH,,,,,,

2016-04-12 09:40:33 TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=547711b5 b50fa5a8

2016-04-12 09:40:33 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2016-04-12 09:40:33 Validating certificate key usage

2016-04-12 09:40:33 ++ Certificate has key usage  00a0, expects 00a0

2016-04-12 09:40:33 VERIFY KU OK

2016-04-12 09:40:33 Validating certificate extended key usage

2016-04-12 09:40:33 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2016-04-12 09:40:33 VERIFY EKU OK

2016-04-12 09:40:33 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2016-04-12 09:40:34 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-04-12 09:40:34 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:40:34 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-04-12 09:40:34 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:40:34 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2016-04-12 09:40:34 [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443

2016-04-12 09:40:35 MANAGEMENT: >STATE:1460450435,GET_CONFIG,,,,,,

2016-04-12 09:40:35 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2016-04-12 09:40:35 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.17.30 255.255.0.0'

2016-04-12 09:40:35 OPTIONS IMPORT: timers and/or timeouts modified

2016-04-12 09:40:35 OPTIONS IMPORT: compression parms modified

2016-04-12 09:40:35 OPTIONS IMPORT: --ifconfig/up options modified

2016-04-12 09:40:35 OPTIONS IMPORT: route options modified

2016-04-12 09:40:35 OPTIONS IMPORT: route-related options modified

2016-04-12 09:40:35 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2016-04-12 09:40:35 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2016-04-12 09:40:35 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

2016-04-12 09:40:35 MANAGEMENT: >STATE:1460450435,ASSIGN_IP,,10.4.17.30,,,,

2016-04-12 09:40:35 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2016-04-12 09:40:35 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-04-12 09:40:35 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2016-04-12 09:40:35 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'

2016-04-12 09:40:35 Opening tun interface:

2016-04-12 09:40:35 Ignoring multicast route: 224.0.0.0/3

2016-04-12 09:40:35 Local IPv4: 10.4.17.30/16 IPv6: null MTU: 1500

2016-04-12 09:40:35 DNS Server: 10.4.0.1, Domain: null

2016-04-12 09:40:35 Routes: 0.0.0.0/0, 10.4.0.0/16 

2016-04-12 09:40:35 Routes excluded: 192.168.0.4/24 

2016-04-12 09:40:35 VpnService routes installed: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3 

2016-04-12 09:40:35 Disallowed VPN apps: 

2016-04-12 09:40:35 MANAGEMENT: CMD 'needok 'OPENTUN' ok'

2016-04-12 09:40:35 Initialization Sequence Completed

2016-04-12 09:40:35
MANAGEMENT:
>STATE:1460450435,CONNECTED,SUCCESS,10.4.17.30,82.145.37.202,443,,

2016-04-12 09:42:36 [server] Inactivity timeout (--ping-restart), restarting

2016-04-12 09:42:36 TCP/UDP: Closing socket

2016-04-12 09:42:36 SIGUSR1[soft,ping-restart] received, process restarting

2016-04-12 09:42:36 MANAGEMENT: >STATE:1460450556,RECONNECTING,ping-restart,,,,,

2016-04-12 09:42:36 MANAGEMENT: CMD 'hold release'

2016-04-12 09:42:36 MANAGEMENT: CMD 'bytecount 2'

2016-04-12 09:42:36 MANAGEMENT: CMD 'state on'

2016-04-12 09:42:36 MANAGEMENT: CMD 'proxy NONE'

2016-04-12 09:42:37 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:42:37 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:42:37 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2016-04-12 09:42:37 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:395 ET:0 EL:3 ]

2016-04-12 09:42:37 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2016-04-12 09:42:37 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2016-04-12 09:42:37 TCP/UDP: Preserving recently used remote address: [AF_INET]82.145.37.202:443

2016-04-12 
09:42:37 Socket Buffers: R=[163840->163840] S=[163840->163840]

2016-04-12 09:42:37 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2016-04-12 09:42:37 UDP link local: (not bound)

2016-04-12 09:42:37 UDP link remote: [AF_INET]82.145.37.202:443

2016-04-12 09:42:37 MANAGEMENT: >STATE:1460450557,WAIT,,,,,,

2016-04-12 09:42:37 MANAGEMENT: >STATE:1460450557,AUTH,,,,,,

2016-04-12 09:42:37 TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=fdabb88b 56ea88a0

2016-04-12 09:42:38 PID_ERR replay-window backtrack occurred [3] [TLS_AUTH-0] [000_1] 1460450558:5 1460450558:2 t=1460450558[0] r=[-1,64,15,3,1] sl=[59,5,64,272]

2016-04-12 09:42:38 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2016-04-12 09:42:38 Validating certificate key usage

2016-04-12 09:42:38 ++ Certificate has key usage  00a0, expects 00a0

2016-04-12 09:42:38 VERIFY KU OK

2016-04-12 09:42:38 Validating certificate extended key usage

2016-04-12 09:42:38 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2016-04-12 09:42:38 VERIFY EKU OK

2016-04-12 09:42:38 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2016-04-12 09:42:38 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-04-12 09:42:38 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:42:38 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-04-12 09:42:38 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:42:38 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2016-04-12 09:42:38 [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443

2016-04-12 09:42:39 MANAGEMENT: >STATE:1460450559,GET_CONFIG,,,,,,

2016-04-12 09:42:39 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2016-04-12 09:42:39 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.17.30 255.255.0.0'

2016-04-12 09:42:39 OPTIONS IMPORT: timers and/or timeouts modified

2016-04-12 09:42:39 OPTIONS IMPORT: compression parms modified

2016-04-12 09:42:39 OPTIONS IMPORT: --ifconfig/up options modified

2016-04-12 09:42:39 OPTIONS IMPORT: route options modified

2016-04-12 09:42:39 OPTIONS IMPORT: route-related options modified

2016-04-12 09:42:39 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2016-04-12 09:42:39 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2016-04-12 09:42:39 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

2016-04-12 09:42:39 MANAGEMENT: >STATE:1460450559,ASSIGN_IP,,10.4.17.30,,,,

2016-04-12 09:42:39 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2016-04-12 09:42:39 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-04-12 09:42:39 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2016-04-12 09:42:39 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'

2016-04-12 09:42:39 Opening tun interface:

2016-04-12 09:42:39 Ignoring multicast route: 224.0.0.0/3

2016-04-12 09:42:39 Local IPv4: 10.4.17.30/16 IPv6: null MTU: 1500

2016-04-12 09:42:39 DNS Server: 10.4.0.1, Domain: null

2016-04-12 09:42:39 Routes: 0.0.0.0/0, 10.4.0.0/16 

2016-04-12 09:42:39 Routes excluded: 192.168.0.4/24 

2016-04-12 09:42:39 VpnService routes installed: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3 

2016-04-12 09:42:39 Disallowed VPN apps: 

2016-04-12 09:42:40 MANAGEMENT: CMD 'needok 'OPENTUN' ok'

2016-04-12 09:42:40 Initialization Sequence Completed

2016-04-12 09:42:40 MANAGEMENT: >STATE:1460450560,CONNECTED,SUCCESS,10.4.17.30,82.145.37.202,443,,

2016-04-12 09:44:40 [server] Inactivity timeout (--ping-restart), restarting

2016-04-12 09:44:40 TCP/UDP: Closing socket

2016-04-12 09:44:40 SIGUSR1[soft,ping-restart] received, process restarting

2016-04-12 09:44:40 MANAGEMENT: >STATE:1460450680,RECONNECTING,ping-restart,,,,,

2016-04-12 09:44:40 MANAGEMENT: CMD 'hold release'

2016-04-12 09:44:40 MANAGEMENT: CMD 'bytecount 2'

2016-04-12 09:44:40 MANAGEMENT: CMD 'state on'

2016-04-12 09:44:40 MANAGEMENT: CMD 'proxy NONE'

2016-04-12 09:44:41 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:44:41 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:44:41 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2016-04-12 09:44:41 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:395 ET:0 EL:3 ]

2016-04-12 09:44:41 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2016-04-12 09:44:41 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2016-04-12 09:44:41 TCP/UDP: Preserving recently used remote address: [AF_INET]82.145.37.202:443

2016-04-12 09:44:41 Socket Buffers: R=[163840->163840] S=[163840->163840]

2016-04-12 09:44:41 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2016-04-12 09:44:41 UDP link local: (not bound)

2016-04-12 09:44:41 UDP link remote: [AF_INET]82.145.37.202:443

2016-04-12 09:44:41 MANAGEMENT: >STATE:1460450681,WAIT,,,,,,

2016-04-12 09:44:41 MANAGEMENT: >STATE:1460450681,AUTH,,,,,,

2016-04-12 09:44:41 TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=abb6a58f a803d03e

2016-04-12 09:44:41 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2016-04-12 09:44:41 Validating certificate key usage

2016-04-12 09:44:41 ++ Certificate has key usage  00a0, expects 00a0

2016-04-12 09:44:41 VERIFY KU OK

2016-04-12 09:44:41 Validating certificate extended key usage

2016-04-12 09:44:41 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2016-04-12 09:44:41 VERIFY EKU OK

2016-04-12 09:44:41 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2016-04-12 09:44:42 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-04-12 09:44:42 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:44:42 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-04-12 09:44:42 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-04-12 09:44:42 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2016-04-12 09:44:42 [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443

2016-04-12 09:44:43 MANAGEMENT: >STATE:1460450683,GET_CONFIG,,,,,,

2016-04-12 09:44:43 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2016-04-12 09:44:43 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.17.30 255.255.0.0'

2016-04-12 09:44:43 OPTIONS IMPORT: timers and/or timeouts modified

2016-04-12 09:44:43 OPTIONS IMPORT: compression parms modified

2016-04-12 09:44:43 OPTIONS IMPORT: --ifconfig/up options modified

2016-04-12 09:44:43 OPTIONS IMPORT: route options modified

2016-04-12 09:44:43 OPTIONS IMPORT: route-related options modified

2016-04-12 09:44:43 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2016-04-12 09:44:43 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2016-04-12 09:44:43 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

2016-04-12 09:44:43 MANAGEMENT: >STATE:1460450683,ASSIGN_IP,,10.4.17.30,,,,

2016-04-12 09:44:43 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2016-04-12 09:44:43 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-04-12 09:44:43 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2016-04-12 09:44:43 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'

2016-04-12 09:44:43 Opening tun interface:

2016-04-12 09:44:43 Ignoring multicast route: 224.0.0.0/3

2016-04-12 09:44:43 Local IPv4: 10.4.17.30/16 IPv6: null MTU: 1500

2016-04-12 09:44:43 DNS Server: 10.4.0.1, Domain: null

2016-04-12 09:44:43 Routes: 0.0.0.0/0, 10.4.0.0/16 

2016-04-12 09:44:43 Routes excluded: 192.168.0.4/24 

2016-04-12 09:44:43 VpnService routes installed: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3 

2016-04-12 09:44:43 Disallowed VPN apps: 

2016-04-12 09:44:43 MANAGEMENT: CMD 'needok 'OPENTUN' ok'

2016-04-12 09:44:43 Initialization Sequence Completed

2016-04-12 09:44:43 MANAGEMENT: >STATE:1460450683,CONNECTED,SUCCESS,10.4.17.30,82.145.37.202,443,,

 

So what could be causing this to happen suddenly?

 

---

 

Uhh, One more thing I just noticed..

 

OK so call me crazy and this might be coincidence, but it seems to only do it when I am connected on all three devices at once (or at least both of my android devices). My phone was connected and working just fine, whilst my tablet was not connected. As soon as I got my tablet out and set a youtube video going, both devices started doing the disconnect thing. Similarly my tablet is now streaming a video just fine and as soon as my phone reconnects, both devices do the disconnect thing.

 

My client area is also strangely only showing 2 active sessions, even when I am using all three devices.

 

Am I completely barking up the wrong tree here?

 

My desktop seems to have stopped doing it now, too.  Scratch that, it did it again.

Share this post


Link to post

Hello,

 

in some cases, this issue is caused by a router bug which comes out especially when handling UDP. Of course, if those devices are not connected to the router, this possible explanation must be ruled out. Anyway, please make sure that your router firmware is up to date.

 

Side note, probably not related to your issue: when you connect multiple devices at the same time, make sure to connect each device to a different VPN server to prevent conflicts.

 

Kind regards

Share this post


Link to post

Thanks for the response. As I mentioned, I'm sure that it still did it when I switched to LTE instead of using my home router.

 

There is a high likelyhood, that I was connected to the same server with at least 2 of the devices, so maybe it was this causing the problem. I've just never seen this issue before.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...