Jump to content
Not connected, Your IP: 3.145.156.46

Recommended Posts

Been have random disconnects on new install of Mint/Mate 17.3.  The log from the most recent disconnect is attached.  Any ideas what I doing wrong?

 

 

Share this post


Link to post

The log from the most recent disconnect is attached.

 

Did you attach it after uploading it? Edit your post and do so.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Oops.  I musta dropped the ball.  Here's the log.  (Mods, please delete any identifying info .... I think I saw a  &^%%#$*  Yahoo robot in here earlier)

 

 

II 2016.04.17 04:25:02 - AirVPN client version: 2.10.3 / x64, System: Linux, Name: Linux Mint 17.3 Rosa \n \l / x64
. 2016.04.17 04:25:02 - Reading options from /home/d-word/.airvpn/AirVPN.xml
. 2016.04.17 04:25:02 - Data Path: /home/d-word/.airvpn
. 2016.04.17 04:25:02 - App Path: /usr/lib/AirVPN
. 2016.04.17 04:25:02 - Executable Path: /usr/lib/AirVPN/AirVPN.exe
. 2016.04.17 04:25:02 - Command line arguments (1): path="/home/d-word/.airvpn"
. 2016.04.17 04:25:02 - Updating systems & servers data ...
. 2016.04.17 04:25:02 - Operating System: Unix 3.19.0.32 - Linux agr 3.19.0-32-generic #37~14.04.1-Ubuntu SMP Thu Oct 22 09:41:40 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
I 2016.04.17 04:25:02 - OpenVPN Driver - Found, /dev/net/tun
I 2016.04.17 04:25:02 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)
I 2016.04.17 04:25:02 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)
I 2016.04.17 04:25:02 - SSL - Version: stunnel 4.53 (/usr/bin/stunnel4)
! 2016.04.17 04:25:02 - Ready
. 2016.04.17 04:25:08 - Systems & servers data update completed
I 2016.04.17 04:25:18 - Checking login ...
F 2016.04.17 04:25:19 - Wrong login/password.
I 2016.04.17 04:25:47 - Checking login ...
! 2016.04.17 04:25:50 - Logged in.
! 2016.04.17 04:25:55 - Activation of Network Lock - Linux IPTables
I 2016.04.17 04:26:21 - Session starting.
W 2016.04.17 04:26:21 - Unable to understand if IPV6 is active.
I 2016.04.17 04:26:21 - Checking authorization ...
! 2016.04.17 04:26:22 - Connecting to Kraz (Canada, Toronto, Ontario)
. 2016.04.17 04:26:22 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec  1 2014
. 2016.04.17 04:26:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.17 04:26:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.17 04:26:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 04:26:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 04:26:22 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]
. 2016.04.17 04:26:22 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.17 04:26:22 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.61:443
. 2016.04.17 04:26:22 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.61:443, sid=c4741905 cef46c87
. 2016.04.17 04:26:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.17 04:26:23 - OpenVPN > Validating certificate key usage
. 2016.04.17 04:26:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.04.17 04:26:23 - OpenVPN > VERIFY KU OK
. 2016.04.17 04:26:23 - OpenVPN > Validating certificate extended key usage
. 2016.04.17 04:26:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.17 04:26:23 - OpenVPN > VERIFY EKU OK
. 2016.04.17 04:26:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.17 04:26:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.17 04:26:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 04:26:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.17 04:26:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 04:26:29 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.04.17 04:26:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.61:443
. 2016.04.17 04:26:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.17 04:26:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.140 255.255.0.0'
. 2016.04.17 04:26:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.17 04:26:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.17 04:26:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.17 04:26:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.17 04:26:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.17 04:26:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.17 04:26:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=wlan0 HWADDR=00:c0:ca:85:03:00
. 2016.04.17 04:26:32 - OpenVPN > TUN/TAP device tun0 opened
. 2016.04.17 04:26:32 - OpenVPN > TUN/TAP TX queue length set to 100
. 2016.04.17 04:26:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.17 04:26:32 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2016.04.17 04:26:32 - OpenVPN > /sbin/ip addr add dev tun0 10.4.23.140/16 broadcast 10.4.255.255
. 2016.04.17 04:26:37 - OpenVPN > /sbin/ip route add 199.19.94.61/32 via 192.168.1.1
. 2016.04.17 04:26:37 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2016.04.17 04:26:37 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2016.04.17 04:26:37 - Starting Management Interface
. 2016.04.17 04:26:37 - OpenVPN > Initialization Sequence Completed
I 2016.04.17 04:26:37 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup
I 2016.04.17 04:26:37 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
I 2016.04.17 04:26:37 - Flushing DNS
I 2016.04.17 04:26:37 - Checking route
I 2016.04.17 04:26:39 - Checking DNS
! 2016.04.17 04:26:40 - Connected.
. 2016.04.17 04:26:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.04.17 04:26:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.04.17 04:55:11 - Updating systems & servers data ...
. 2016.04.17 04:55:15 - Systems & servers data update completed
. 2016.04.17 05:05:18 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.04.17 05:05:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.04.17 05:05:18 - OpenVPN > Restart pause, 2 second(s)
! 2016.04.17 05:05:18 - Disconnecting
. 2016.04.17 05:05:18 - Management - Send 'signal SIGTERM'
. 2016.04.17 05:05:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.17 05:05:18 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.04.17 05:05:18 - OpenVPN > Assertion failed at misc.c:785
. 2016.04.17 05:05:18 - OpenVPN > Exiting due to fatal error
. 2016.04.17 05:05:18 - Connection terminated.
I 2016.04.17 05:05:18 - DNS of the system restored to original settings (Rename method)
I 2016.04.17 05:05:45 - Checking authorization ...
W 2016.04.17 05:05:53 - Authorization check failed, continue anyway ({1])
! 2016.04.17 05:05:53 - Connecting to Kraz (Canada, Toronto, Ontario)
. 2016.04.17 05:05:53 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec  1 2014
. 2016.04.17 05:05:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.17 05:05:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.17 05:05:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 05:05:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 05:05:53 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]
. 2016.04.17 05:05:53 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.17 05:05:53 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.61:443
. 2016.04.17 05:06:25 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2016.04.17 05:06:25 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.04.17 05:06:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2016.04.17 05:06:30 - Disconnecting
. 2016.04.17 05:06:30 - Connection terminated.
I 2016.04.17 05:06:33 - Checking authorization ...
W 2016.04.17 05:06:33 - Authorization check failed, continue anyway ({1])
! 2016.04.17 05:06:33 - Connecting to Kraz (Canada, Toronto, Ontario)
. 2016.04.17 05:06:33 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec  1 2014
. 2016.04.17 05:06:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.17 05:06:33 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.17 05:06:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 05:06:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.17 05:06:33 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]
. 2016.04.17 05:06:33 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.17 05:06:33 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.61:443

Share this post


Link to post

I'm experiencing something similar! I'm running Raspbian Jessie, with the most-recent Debian-packaged OpenVPN. It runs fine for a couple of hours, but then times out and makes all traffic outside of my subnet hang. 

Share this post


Link to post

I'm having similar problems with Mint 17.2 that seem to be related to OpenVPN, though I'm using OpenVPN through an SSL connection. Sometimes Eddie just keeps disconnecting and reconnecting. The router doesn't seem to matter since I have similar problems at several locations (home, coffee shop, mall, etc). 

 

. 2016.04.16 17:21:57 - SSL > connect_blocking: connected 46.166.165.240:443
. 2016.04.16 17:21:57 - SSL > Service [openvpn] connected remote server from 192.168.15.100:56953
. 2016.04.16 17:21:58 - SSL > CERT: Locally installed certificate matched
. 2016.04.16 17:21:58 - SSL > Certificate accepted: depth=0, /C=IT/ST=Italy/L=Perugia/O=AirVPN/OU=stunnel/CN=stunnel.airvpn.org/emailAddress=info@airvpn.org
. 2016.04.16 17:21:58 - SSL > SSL connected: new session negotiated
. 2016.04.16 17:21:58 - SSL > Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-RC4-SHA (128-bit encryption)
. 2016.04.16 17:21:58 - SSL > Compression: null, expansion: null
. 2016.04.16 17:21:59 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:24387, sid=77c3f463 7fa97f4c
. 2016.04.16 17:21:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 17:21:59 - OpenVPN > Validating certificate key usage
. 2016.04.16 17:21:59 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 17:21:59 - OpenVPN > VERIFY KU OK
. 2016.04.16 17:21:59 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 17:21:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 17:21:59 - OpenVPN > VERIFY EKU OK
. 2016.04.16 17:21:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 17:22:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 17:22:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:22:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 17:22:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:22:03 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.04.16 17:22:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:24387
. 2016.04.16 17:22:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.16 17:22:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.6 255.255.0.0'
. 2016.04.16 17:22:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.16 17:22:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.16 17:22:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.16 17:22:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.16 17:22:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.16 17:22:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.16 17:22:06 - OpenVPN > ROUTE_GATEWAY 192.168.15.1/255.255.255.0 IFACE=wlan0 HWADDR=5c:e0:c5:9e:39:19
. 2016.04.16 17:22:06 - OpenVPN > TUN/TAP device tun0 opened
. 2016.04.16 17:22:06 - OpenVPN > TUN/TAP TX queue length set to 100
. 2016.04.16 17:22:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.16 17:22:06 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2016.04.16 17:22:06 - OpenVPN > /sbin/ip addr add dev tun0 10.50.0.6/16 broadcast 10.50.255.255
. 2016.04.16 17:22:11 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.15.1
. 2016.04.16 17:22:11 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.50.0.1
. 2016.04.16 17:22:11 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.50.0.1
. 2016.04.16 17:22:11 - OpenVPN > /sbin/ip route add 46.166.165.240/32 via 192.168.15.1
. 2016.04.16 17:22:11 - Starting Management Interface
. 2016.04.16 17:22:11 - OpenVPN > Initialization Sequence Completed
I 2016.04.16 17:22:11 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup
I 2016.04.16 17:22:11 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
I 2016.04.16 17:22:11 - Flushing DNS
I 2016.04.16 17:22:11 - Checking route
I 2016.04.16 17:22:15 - Checking DNS
! 2016.04.16 17:22:17 - Connected.
. 2016.04.16 17:22:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2016.04.16 17:22:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.04.16 17:28:30 - Updating systems & servers data ...
. 2016.04.16 17:28:40 - Updating systems & servers data ..., 1° try failed (The request timed out)
. 2016.04.16 17:28:48 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.04.16 17:28:48 - SSL > SSL_shutdown successfully sent close_notify alert
. 2016.04.16 17:28:48 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
! 2016.04.16 17:28:48 - Disconnecting
. 2016.04.16 17:28:48 - OpenVPN > Restart pause, 5 second(s)
. 2016.04.16 17:28:48 - Management - Send 'signal SIGTERM'
. 2016.04.16 17:28:48 - SSL > transfer: s_poll_wait: TIMEOUTclose exceeded: closing
. 2016.04.16 17:28:48 - SSL > Connection closed: 552799 byte(s) sent to SSL, 4594423 byte(s) sent to socket
. 2016.04.16 17:28:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.16 17:28:48 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.04.16 17:28:48 - OpenVPN > Assertion failed at misc.c:785
. 2016.04.16 17:28:48 - OpenVPN > Exiting due to fatal error
. 2016.04.16 17:28:48 - Connection terminated.
I 2016.04.16 17:28:48 - DNS of the system restored to original settings (Rename method)
. 2016.04.16 17:28:50 - Updating systems & servers data ..., 2° try failed (The request timed out)
. 2016.04.16 17:28:51 - Systems & servers data update completed
I 2016.04.16 17:28:51 - Checking authorization ...
! 2016.04.16 17:28:52 - Connecting to Almach (Canada, Toronto, Ontario)
. 2016.04.16 17:28:52 - SSL > stunnel 4.53 on x86_64-pc-linux-gnu platform
. 2016.04.16 17:28:52 - SSL > Compiled with OpenSSL 1.0.1e 11 Feb 2013
. 2016.04.16 17:28:52 - SSL > Running with OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 17:28:52 - SSL > Update OpenSSL shared libraries or rebuild stunnel
. 2016.04.16 17:28:52 - SSL > Threading:PTHREAD SSL:+ENGINE+OCSP Auth:LIBWRAP Sockets:POLL+IPv6
. 2016.04.16 17:28:52 - SSL > Reading configuration from file /home/gene/.airvpn/3fdcfab17409bd04261fb70fc38de2d5ff07a18929dcfe60c0e668c55373f347.tmp.ssl
. 2016.04.16 17:28:52 - SSL > Initializing service section [openvpn]
. 2016.04.16 17:28:52 - SSL > Configuration successful
. 2016.04.16 17:28:52 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 17:28:52 - SSL > Service [openvpn] accepted connection from 127.0.0.1:46633
. 2016.04.16 17:28:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 17:28:52 - SSL > connect_blocking: connecting 199.19.94.18:443
. 2016.04.16 17:28:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 17:28:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:28:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:28:52 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 17:28:52 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:4047 [nonblock]
. 2016.04.16 17:28:52 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:4047
. 2016.04.16 17:28:52 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 17:28:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:4047
. 2016.04.16 17:28:52 - SSL > connect_blocking: connected 199.19.94.18:443
. 2016.04.16 17:28:52 - SSL > Service [openvpn] connected remote server from 192.168.15.100:53386
. 2016.04.16 17:29:24 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2016.04.16 17:29:24 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting
! 2016.04.16 17:29:24 - Disconnecting
. 2016.04.16 17:29:24 - Connection terminated.
I 2016.04.16 17:29:27 - Checking authorization ...
! 2016.04.16 17:29:28 - Connecting to Almach (Canada, Toronto, Ontario)
. 2016.04.16 17:29:28 - SSL > stunnel 4.53 on x86_64-pc-linux-gnu platform
. 2016.04.16 17:29:28 - SSL > Compiled with OpenSSL 1.0.1e 11 Feb 2013
. 2016.04.16 17:29:28 - SSL > Running with OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 17:29:28 - SSL > Update OpenSSL shared libraries or rebuild stunnel
. 2016.04.16 17:29:28 - SSL > Threading:PTHREAD SSL:+ENGINE+OCSP Auth:LIBWRAP Sockets:POLL+IPv6
. 2016.04.16 17:29:28 - SSL > Reading configuration from file /home/gene/.airvpn/233c4bc49052b69011f6876e76e6775b7ad7402cda7963d682b74c7d871d0844.tmp.ssl
. 2016.04.16 17:29:28 - SSL > Initializing service section [openvpn]
. 2016.04.16 17:29:28 - SSL > Configuration successful
. 2016.04.16 17:29:28 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 17:29:28 - SSL > Service [openvpn] accepted connection from 127.0.0.1:40059
. 2016.04.16 17:29:28 - SSL > connect_blocking: connecting 199.19.94.18:443
. 2016.04.16 17:29:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 17:29:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 17:29:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:29:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:29:28 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 17:29:28 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:15677 [nonblock]
. 2016.04.16 17:29:28 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:15677
. 2016.04.16 17:29:28 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 17:29:28 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:15677
. 2016.04.16 17:29:38 - SSL > connect_blocking: s_poll_wait 199.19.94.18:443: TIMEOUTconnect exceeded
. 2016.04.16 17:29:38 - OpenVPN > Connection reset, restarting [-1]
. 2016.04.16 17:29:38 - SSL > Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.04.16 17:29:38 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 17:29:38 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 17:29:38 - Disconnecting
. 2016.04.16 17:29:39 - Connection terminated.
I 2016.04.16 17:29:42 - Checking authorization ...
! 2016.04.16 17:29:42 - Connecting to Almach (Canada, Toronto, Ontario)
. 2016.04.16 17:29:42 - SSL > stunnel 4.53 on x86_64-pc-linux-gnu platform
. 2016.04.16 17:29:42 - SSL > Compiled with OpenSSL 1.0.1e 11 Feb 2013
. 2016.04.16 17:29:42 - SSL > Running with OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 17:29:42 - SSL > Update OpenSSL shared libraries or rebuild stunnel
. 2016.04.16 17:29:42 - SSL > Threading:PTHREAD SSL:+ENGINE+OCSP Auth:LIBWRAP Sockets:POLL+IPv6
. 2016.04.16 17:29:42 - SSL > Reading configuration from file /home/gene/.airvpn/7a4ba014bf4e7dcaa46a0478e9a1097fa6f2208098601ec40f99893ecb5a01d0.tmp.ssl
. 2016.04.16 17:29:42 - SSL > Initializing service section [openvpn]
. 2016.04.16 17:29:42 - SSL > Configuration successful
. 2016.04.16 17:29:42 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 17:29:42 - SSL > Service [openvpn] accepted connection from 127.0.0.1:52334
. 2016.04.16 17:29:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 17:29:42 - SSL > connect_blocking: connecting 199.19.94.18:443
. 2016.04.16 17:29:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 17:29:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:29:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 17:29:42 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 17:29:42 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:18533 [nonblock]
. 2016.04.16 17:29:42 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:18533
. 2016.04.16 17:29:42 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 17:29:42 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:18533
. 2016.04.16 17:29:52 - SSL > connect_blocking: s_poll_wait 199.19.94.18:443: TIMEOUTconnect exceeded
. 2016.04.16 17:29:52 - SSL > Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.04.16 17:29:52 - OpenVPN > Connection reset, restarting [-1]
. 2016.04.16 17:29:52 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 17:29:52 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 17:29:52 - Disconnecting
. 2016.04.16 17:29:53 - Connection terminated.

AND

2016.04.16 19:22:00 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:22:00 - Disconnecting
. 2016.04.16 19:22:00 - Management - Send 'signal SIGTERM'
. 2016.04.16 19:22:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.16 19:22:00 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.04.16 19:22:00 - OpenVPN > Assertion failed at misc.c:785
. 2016.04.16 19:22:00 - OpenVPN > Exiting due to fatal error
. 2016.04.16 19:22:00 - Connection terminated.
I 2016.04.16 19:22:00 - DNS of the system restored to original settings (Rename method)
I 2016.04.16 19:22:14 - Checking authorization ...
! 2016.04.16 19:22:15 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.04.16 19:22:15 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:22:15 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:22:15 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:22:15 - SSH > debug1: Connecting to 213.152.161.139 [213.152.161.139] port 22.
. 2016.04.16 19:22:16 - SSH > debug1: Connection established.
. 2016.04.16 19:22:16 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:22:16 - SSH > debug1: identity file /home/gene/.airvpn/73fc10d47319eb6ca7e498c6508a87175253f3bd7e035986aef3b1a32ebe6529.tmp.key type -1
. 2016.04.16 19:22:16 - SSH > debug1: identity file /home/gene/.airvpn/73fc10d47319eb6ca7e498c6508a87175253f3bd7e035986aef3b1a32ebe6529.tmp.key-cert type -1
. 2016.04.16 19:22:16 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:22:16 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:22:17 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:22:17 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:22:17 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:22:19 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:22:19 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:22:19 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:22:19 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:22:19 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:22:21 - SSH > debug1: Server host key: ECDSA 28:9f:19:13:80:65:ef:c1:c9:2e:7d:c3:e7:94:65:e7
. 2016.04.16 19:22:21 - SSH > Warning: Permanently added '213.152.161.139' (ECDSA) to the list of known hosts.
. 2016.04.16 19:22:21 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:22:21 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:22:21 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:22:21 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:22:21 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:22:23 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:22:25 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:22:25 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:22:25 - SSH > debug1: Trying private key: /home/gene/.airvpn/73fc10d47319eb6ca7e498c6508a87175253f3bd7e035986aef3b1a32ebe6529.tmp.key
. 2016.04.16 19:22:25 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:22:25 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:22:26 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:22:26 - SSH > Authenticated to 213.152.161.139 ([213.152.161.139]:22).
. 2016.04.16 19:22:26 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:22:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:22:26 - SSH > debug1: Local connections to LOCALHOST:64707 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:22:26 - SSH > debug1: Local forwarding listening on ::1 port 64707.
. 2016.04.16 19:22:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:22:26 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:22:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:22:26 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 64707.
. 2016.04.16 19:22:26 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:22:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:22:26 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:22:26 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:22:26 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:22:26 - SSH > debug1: Connection to port 64707 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:22:26 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:64707 [nonblock]
. 2016.04.16 19:22:26 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:22:26 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:64707
. 2016.04.16 19:22:26 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:22:26 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:64707
. 2016.04.16 19:22:26 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:22:26 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:22:26 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:22:28 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:64707, sid=cd703ae6 c4c3d986
. 2016.04.16 19:22:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:22:28 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:22:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:22:28 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:22:29 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:22:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:22:29 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:22:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:22:37 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:22:37 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:22:37 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:22:37 - Disconnecting
. 2016.04.16 19:22:38 - Connection terminated.
I 2016.04.16 19:22:41 - Checking authorization ...
! 2016.04.16 19:22:41 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.04.16 19:22:41 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:22:41 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:22:41 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:22:41 - SSH > debug1: Connecting to 213.152.161.139 [213.152.161.139] port 22.
. 2016.04.16 19:22:42 - SSH > debug1: Connection established.
. 2016.04.16 19:22:42 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:22:42 - SSH > debug1: identity file /home/gene/.airvpn/c8f6e2822f2fc5efa10570c16da3a335c842ed2c97b3fc598af2a81906365efa.tmp.key type -1
. 2016.04.16 19:22:42 - SSH > debug1: identity file /home/gene/.airvpn/c8f6e2822f2fc5efa10570c16da3a335c842ed2c97b3fc598af2a81906365efa.tmp.key-cert type -1
. 2016.04.16 19:22:42 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:22:42 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:22:45 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:22:45 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:22:45 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:22:45 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:22:45 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:22:45 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:22:45 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:22:45 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:22:51 - SSH > debug1: Server host key: ECDSA 28:9f:19:13:80:65:ef:c1:c9:2e:7d:c3:e7:94:65:e7
. 2016.04.16 19:22:51 - SSH > Warning: Permanently added '213.152.161.139' (ECDSA) to the list of known hosts.
. 2016.04.16 19:22:51 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:22:51 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:22:51 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:22:51 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:22:51 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:22:53 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:22:53 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:22:53 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:22:53 - SSH > debug1: Trying private key: /home/gene/.airvpn/c8f6e2822f2fc5efa10570c16da3a335c842ed2c97b3fc598af2a81906365efa.tmp.key
. 2016.04.16 19:22:53 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:22:53 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:22:54 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:22:54 - SSH > Authenticated to 213.152.161.139 ([213.152.161.139]:22).
. 2016.04.16 19:22:54 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:22:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:22:54 - SSH > debug1: Local connections to LOCALHOST:23488 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:22:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:22:54 - SSH > debug1: Local forwarding listening on ::1 port 23488.
. 2016.04.16 19:22:54 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:22:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:22:54 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 23488.
. 2016.04.16 19:22:54 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:22:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:22:54 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:22:54 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:22:54 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:22:54 - SSH > debug1: Connection to port 23488 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:22:54 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:23488 [nonblock]
. 2016.04.16 19:22:54 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:22:54 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:23488
. 2016.04.16 19:22:54 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:22:54 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:23488
. 2016.04.16 19:22:55 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:22:55 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:22:55 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:22:56 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:23488, sid=600a9839 af5ab2fa
. 2016.04.16 19:22:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:22:59 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:22:59 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:22:59 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:22:59 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:22:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:22:59 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:22:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:23:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 19:23:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:23:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 19:23:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:23:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.04.16 19:23:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:23488
. 2016.04.16 19:23:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.16 19:23:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.4.199 255.255.0.0'
. 2016.04.16 19:23:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.16 19:23:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.16 19:23:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.16 19:23:20 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.16 19:23:20 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.16 19:23:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.16 19:23:20 - OpenVPN > ROUTE_GATEWAY 192.168.15.1/255.255.255.0 IFACE=wlan0 HWADDR=5c:e0:c5:9e:39:19
. 2016.04.16 19:23:20 - OpenVPN > TUN/TAP device tun0 opened
. 2016.04.16 19:23:20 - OpenVPN > TUN/TAP TX queue length set to 100
. 2016.04.16 19:23:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.16 19:23:20 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2016.04.16 19:23:20 - OpenVPN > /sbin/ip addr add dev tun0 10.50.4.199/16 broadcast 10.50.255.255
. 2016.04.16 19:23:25 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.15.1
. 2016.04.16 19:23:25 - OpenVPN > RTNETLINK answers: File exists
. 2016.04.16 19:23:25 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2
. 2016.04.16 19:23:25 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.50.0.1
. 2016.04.16 19:23:25 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.50.0.1
. 2016.04.16 19:23:25 - OpenVPN > /sbin/ip route add 213.152.161.139/32 via 192.168.15.1
. 2016.04.16 19:23:25 - Starting Management Interface
. 2016.04.16 19:23:25 - OpenVPN > Initialization Sequence Completed
I 2016.04.16 19:23:25 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup
I 2016.04.16 19:23:25 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
I 2016.04.16 19:23:25 - Flushing DNS
I 2016.04.16 19:23:25 - Checking route
W 2016.04.16 19:23:35 - Checking route, 1° try failed (The request timed out)
W 2016.04.16 19:23:45 - Checking route, 2° try failed (The request timed out)
W 2016.04.16 19:23:55 - Checking route, 3° try failed (The request timed out)
W 2016.04.16 19:24:05 - Checking route, 4° try failed (The request timed out)
W 2016.04.16 19:24:15 - Checking route, 5° try failed (The request timed out)
W 2016.04.16 19:24:15 - The request timed out
! 2016.04.16 19:24:15 - Disconnecting
. 2016.04.16 19:24:15 - Management - Send 'signal SIGTERM'
. 2016.04.16 19:24:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.04.16 19:24:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.16 19:24:15 - OpenVPN > /sbin/ip route del 213.152.161.139/32
. 2016.04.16 19:24:15 - OpenVPN > /sbin/ip route del 127.0.0.1/32
. 2016.04.16 19:24:15 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2016.04.16 19:24:15 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2016.04.16 19:24:15 - OpenVPN > Closing TUN/TAP interface
. 2016.04.16 19:24:15 - OpenVPN > /sbin/ip addr del dev tun0 10.50.4.199/16
. 2016.04.16 19:24:15 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.04.16 19:24:15 - Connection terminated.
I 2016.04.16 19:24:15 - DNS of the system restored to original settings (Rename method)
I 2016.04.16 19:24:18 - Checking authorization ...
! 2016.04.16 19:24:19 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.04.16 19:24:19 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:24:19 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:24:19 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:24:19 - SSH > debug1: Connecting to 213.152.161.139 [213.152.161.139] port 22.
. 2016.04.16 19:24:20 - SSH > debug1: Connection established.
. 2016.04.16 19:24:20 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:24:20 - SSH > debug1: identity file /home/gene/.airvpn/a64fe1853815f71478d1ae0cb48fc631af53f2693a7386a46273ef07025e9c88.tmp.key type -1
. 2016.04.16 19:24:20 - SSH > debug1: identity file /home/gene/.airvpn/a64fe1853815f71478d1ae0cb48fc631af53f2693a7386a46273ef07025e9c88.tmp.key-cert type -1
. 2016.04.16 19:24:20 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:24:20 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:24:20 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:24:20 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:24:20 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:24:21 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:24:21 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:24:21 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:24:21 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:24:21 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:24:22 - SSH > debug1: Server host key: ECDSA 28:9f:19:13:80:65:ef:c1:c9:2e:7d:c3:e7:94:65:e7
. 2016.04.16 19:24:22 - SSH > Warning: Permanently added '213.152.161.139' (ECDSA) to the list of known hosts.
. 2016.04.16 19:24:22 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:24:22 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:24:22 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:24:22 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:24:22 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:24:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:24:24 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:24:24 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:24:24 - SSH > debug1: Trying private key: /home/gene/.airvpn/a64fe1853815f71478d1ae0cb48fc631af53f2693a7386a46273ef07025e9c88.tmp.key
. 2016.04.16 19:24:24 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:24:24 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:24:27 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:24:27 - SSH > Authenticated to 213.152.161.139 ([213.152.161.139]:22).
. 2016.04.16 19:24:27 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:24:27 - SSH > debug1: Local connections to LOCALHOST:41114 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:24:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:24:27 - SSH > debug1: Local forwarding listening on ::1 port 41114.
. 2016.04.16 19:24:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:24:27 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:24:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:24:27 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 41114.
. 2016.04.16 19:24:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:24:27 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:24:27 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:24:27 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:24:27 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:41114 [nonblock]
. 2016.04.16 19:24:27 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:24:27 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:41114
. 2016.04.16 19:24:27 - SSH > debug1: Connection to port 41114 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:24:27 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:24:27 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:24:27 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:41114
. 2016.04.16 19:24:28 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:24:28 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:24:28 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:24:29 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:41114, sid=b8abc7d8 55379d7f
. 2016.04.16 19:24:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:24:34 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:24:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:24:34 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:24:34 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:24:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:24:34 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:24:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:24:41 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:24:41 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:24:41 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:24:41 - Disconnecting
. 2016.04.16 19:24:41 - Connection terminated.
I 2016.04.16 19:24:44 - Checking authorization ...
! 2016.04.16 19:24:45 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.04.16 19:24:45 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:24:45 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:24:45 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:24:45 - SSH > debug1: Connecting to 213.152.161.139 [213.152.161.139] port 22.
. 2016.04.16 19:24:45 - SSH > debug1: Connection established.
. 2016.04.16 19:24:45 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:24:45 - SSH > debug1: identity file /home/gene/.airvpn/d47466b9404561e697e368dbc0d5f8f14c98c0c50e71d81fd1d4a7f466d00df6.tmp.key type -1
. 2016.04.16 19:24:45 - SSH > debug1: identity file /home/gene/.airvpn/d47466b9404561e697e368dbc0d5f8f14c98c0c50e71d81fd1d4a7f466d00df6.tmp.key-cert type -1
. 2016.04.16 19:24:45 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:24:45 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:24:48 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:24:48 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:24:48 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:24:48 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:24:48 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:24:48 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:24:48 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:24:48 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:24:56 - SSH > debug1: Server host key: ECDSA 28:9f:19:13:80:65:ef:c1:c9:2e:7d:c3:e7:94:65:e7
. 2016.04.16 19:24:56 - SSH > Warning: Permanently added '213.152.161.139' (ECDSA) to the list of known hosts.
. 2016.04.16 19:24:56 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:24:56 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:24:56 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:24:56 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:24:56 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:24:58 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:24:58 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:24:58 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:24:58 - SSH > debug1: Trying private key: /home/gene/.airvpn/d47466b9404561e697e368dbc0d5f8f14c98c0c50e71d81fd1d4a7f466d00df6.tmp.key
. 2016.04.16 19:24:58 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:24:58 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:24:59 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:24:59 - SSH > Authenticated to 213.152.161.139 ([213.152.161.139]:22).
. 2016.04.16 19:24:59 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:24:59 - SSH > debug1: Local connections to LOCALHOST:13984 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:24:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:24:59 - SSH > debug1: Local forwarding listening on ::1 port 13984.
. 2016.04.16 19:24:59 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:24:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:24:59 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 13984.
. 2016.04.16 19:24:59 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:24:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:24:59 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:24:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:24:59 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:24:59 - SSH > debug1: Connection to port 13984 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:24:59 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:24:59 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:24:59 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:13984 [nonblock]
. 2016.04.16 19:24:59 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:13984
. 2016.04.16 19:24:59 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:24:59 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:13984
. 2016.04.16 19:25:00 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:25:00 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:25:00 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:25:01 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:13984, sid=7ddba02a cbe0c532
. 2016.04.16 19:25:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:25:05 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:25:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:25:05 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:25:05 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:25:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:25:05 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:25:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:25:53 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:25:53 - SSH > debug1: channel 2: free: direct-tcpip: listening port 13984 for 127.0.0.1 port 2018, connect from 127.0.0.1 port 56304 to 127.0.0.1 port 13984, nchannels 3
. 2016.04.16 19:25:53 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:25:53 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:25:53 - Disconnecting
. 2016.04.16 19:25:53 - Connection terminated.
I 2016.04.16 19:25:56 - Checking authorization ...
! 2016.04.16 19:26:00 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.04.16 19:26:00 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:26:00 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:26:00 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:26:00 - SSH > debug1: Connecting to 213.152.161.139 [213.152.161.139] port 22.
. 2016.04.16 19:26:01 - SSH > debug1: Connection established.
. 2016.04.16 19:26:01 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:26:01 - SSH > debug1: identity file /home/gene/.airvpn/8948c6de8aed19137bc40b612abec2a9ad5ed0d8da60159b5556a8ab560e3e23.tmp.key type -1
. 2016.04.16 19:26:01 - SSH > debug1: identity file /home/gene/.airvpn/8948c6de8aed19137bc40b612abec2a9ad5ed0d8da60159b5556a8ab560e3e23.tmp.key-cert type -1
. 2016.04.16 19:26:01 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:26:01 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:26:01 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:26:01 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:26:01 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:26:02 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:26:02 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:26:02 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:26:02 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:26:02 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:26:02 - SSH > debug1: Server host key: ECDSA 28:9f:19:13:80:65:ef:c1:c9:2e:7d:c3:e7:94:65:e7
. 2016.04.16 19:26:02 - SSH > Warning: Permanently added '213.152.161.139' (ECDSA) to the list of known hosts.
. 2016.04.16 19:26:02 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:26:02 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:26:02 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:26:02 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:26:02 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:26:04 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:26:04 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:26:04 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:26:04 - SSH > debug1: Trying private key: /home/gene/.airvpn/8948c6de8aed19137bc40b612abec2a9ad5ed0d8da60159b5556a8ab560e3e23.tmp.key
. 2016.04.16 19:26:04 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:26:04 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:26:19 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:26:19 - SSH > Authenticated to 213.152.161.139 ([213.152.161.139]:22).
. 2016.04.16 19:26:19 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:26:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:26:19 - SSH > debug1: Local connections to LOCALHOST:25653 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:26:19 - SSH > debug1: Local forwarding listening on ::1 port 25653.
. 2016.04.16 19:26:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:26:19 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:26:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:26:19 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 25653.
. 2016.04.16 19:26:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:26:19 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:26:19 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:26:19 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:26:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:25653 [nonblock]
. 2016.04.16 19:26:19 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:26:19 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:25653
. 2016.04.16 19:26:19 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:26:19 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:26:19 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:26:19 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:26:19 - SSH > debug1: Connection to port 25653 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:26:19 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:25653
. 2016.04.16 19:26:19 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:26:25 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:25653, sid=0ac604d8 786d54f9
. 2016.04.16 19:26:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:26:27 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:26:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:26:27 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:26:27 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:26:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:26:27 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:26:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:26:47 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:26:47 - SSH > debug1: channel 2: free: direct-tcpip: listening port 25653 for 127.0.0.1 port 2018, connect from 127.0.0.1 port 42643 to 127.0.0.1 port 25653, nchannels 3
. 2016.04.16 19:26:47 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:26:47 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:26:47 - Disconnecting
. 2016.04.16 19:26:47 - Connection terminated.
I 2016.04.16 19:26:50 - Checking authorization ...
! 2016.04.16 19:26:51 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.04.16 19:26:51 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:26:51 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:26:51 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:26:51 - SSH > debug1: Connecting to 213.152.161.139 [213.152.161.139] port 22.
. 2016.04.16 19:26:52 - SSH > debug1: Connection established.
. 2016.04.16 19:26:52 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:26:52 - SSH > debug1: identity file /home/gene/.airvpn/6d580bd865bf3e8609a3b9bf106203fe9c3043930ba4589eba648a2b3f34ec2f.tmp.key type -1
. 2016.04.16 19:26:52 - SSH > debug1: identity file /home/gene/.airvpn/6d580bd865bf3e8609a3b9bf106203fe9c3043930ba4589eba648a2b3f34ec2f.tmp.key-cert type -1
. 2016.04.16 19:26:52 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:26:52 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:26:52 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:26:52 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:26:52 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:26:53 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:26:53 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:26:53 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:26:53 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:26:53 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:27:27 - SSH > debug1: Server host key: ECDSA 28:9f:19:13:80:65:ef:c1:c9:2e:7d:c3:e7:94:65:e7
. 2016.04.16 19:27:27 - SSH > Warning: Permanently added '213.152.161.139' (ECDSA) to the list of known hosts.
. 2016.04.16 19:27:27 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:27:27 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:27:27 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:27:27 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:27:27 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:27:29 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:27:30 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:27:30 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:27:30 - SSH > debug1: Trying private key: /home/gene/.airvpn/6d580bd865bf3e8609a3b9bf106203fe9c3043930ba4589eba648a2b3f34ec2f.tmp.key
. 2016.04.16 19:27:30 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:27:30 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:27:31 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:27:31 - SSH > Authenticated to 213.152.161.139 ([213.152.161.139]:22).
. 2016.04.16 19:27:31 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:27:31 - SSH > debug1: Local connections to LOCALHOST:27560 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:27:31 - SSH > debug1: Local forwarding listening on ::1 port 27560.
. 2016.04.16 19:27:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:27:31 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:27:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:27:31 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 27560.
. 2016.04.16 19:27:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:27:31 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:27:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:27:31 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:27:31 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:27:31 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:27560 [nonblock]
. 2016.04.16 19:27:31 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:27:31 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:27560
. 2016.04.16 19:27:31 - SSH > debug1: Connection to port 27560 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:27:31 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:27:31 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:27:31 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:27560
. 2016.04.16 19:27:31 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:27:31 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:27:31 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:27:33 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:27560, sid=c1aa8ce8 392bc6a0
. 2016.04.16 19:27:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:27:36 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:27:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:27:36 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:27:36 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:27:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:27:36 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:27:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:28:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 19:28:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:28:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 19:28:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:28:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.04.16 19:28:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:27560
. 2016.04.16 19:28:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.16 19:28:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.4.199 255.255.0.0'
. 2016.04.16 19:28:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.16 19:28:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.16 19:28:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.16 19:28:10 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.16 19:28:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.16 19:28:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.16 19:28:10 - OpenVPN > ROUTE_GATEWAY 192.168.15.1/255.255.255.0 IFACE=wlan0 HWADDR=5c:e0:c5:9e:39:19
. 2016.04.16 19:28:10 - OpenVPN > TUN/TAP device tun0 opened
. 2016.04.16 19:28:10 - OpenVPN > TUN/TAP TX queue length set to 100
. 2016.04.16 19:28:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.16 19:28:10 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2016.04.16 19:28:10 - OpenVPN > /sbin/ip addr add dev tun0 10.50.4.199/16 broadcast 10.50.255.255
. 2016.04.16 19:28:15 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.15.1
. 2016.04.16 19:28:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.50.0.1
. 2016.04.16 19:28:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.50.0.1
. 2016.04.16 19:28:15 - OpenVPN > /sbin/ip route add 213.152.161.139/32 via 192.168.15.1
. 2016.04.16 19:28:15 - Starting Management Interface
. 2016.04.16 19:28:15 - OpenVPN > Initialization Sequence Completed
I 2016.04.16 19:28:15 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup
I 2016.04.16 19:28:15 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
I 2016.04.16 19:28:15 - Flushing DNS
I 2016.04.16 19:28:15 - Checking route
W 2016.04.16 19:28:25 - Checking route, 1° try failed (The request timed out)
W 2016.04.16 19:28:35 - Checking route, 2° try failed (The request timed out)
W 2016.04.16 19:28:49 - Checking info, 1° try failed (The request timed out)
W 2016.04.16 19:28:59 - Checking info, 2° try failed (The request timed out)
W 2016.04.16 19:29:09 - Checking info, 3° try failed (The request timed out)
W 2016.04.16 19:29:19 - Checking info, 4° try failed (The request timed out)
. 2016.04.16 19:29:20 - Updating systems & servers data ...
I 2016.04.16 19:29:24 - Checking DNS
W 2016.04.16 19:29:46 - Checking DNS, 1° try failed (The request timed out)
. 2016.04.16 19:29:55 - Systems & servers data update completed
W 2016.04.16 19:29:56 - Checking DNS, 2° try failed (The request timed out)
! 2016.04.16 19:30:03 - Connected.
. 2016.04.16 19:30:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2016.04.16 19:30:03 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.04.16 19:57:44 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.04.16 19:57:44 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.04.16 19:57:44 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:57:44 - Disconnecting
. 2016.04.16 19:57:44 - Management - Send 'signal SIGTERM'
. 2016.04.16 19:57:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.16 19:57:44 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.04.16 19:57:44 - OpenVPN > Assertion failed at misc.c:785
. 2016.04.16 19:57:44 - OpenVPN > Exiting due to fatal error
. 2016.04.16 19:57:44 - Connection terminated.
I 2016.04.16 19:57:44 - DNS of the system restored to original settings (Rename method)
I 2016.04.16 19:58:01 - Checking authorization ...
! 2016.04.16 19:58:02 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2016.04.16 19:58:02 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:58:02 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:58:02 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:58:02 - SSH > debug1: Connecting to 213.152.161.86 [213.152.161.86] port 22.
. 2016.04.16 19:58:03 - SSH > debug1: Connection established.
. 2016.04.16 19:58:03 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:58:03 - SSH > debug1: identity file /home/gene/.airvpn/c15f1de93e7296f472f36cbeb9c0ee343cce4c2219d935e7cfe076c2123b035e.tmp.key type -1
. 2016.04.16 19:58:03 - SSH > debug1: identity file /home/gene/.airvpn/c15f1de93e7296f472f36cbeb9c0ee343cce4c2219d935e7cfe076c2123b035e.tmp.key-cert type -1
. 2016.04.16 19:58:03 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:58:03 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:58:04 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:58:04 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:58:04 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:58:04 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:58:04 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:58:04 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:58:04 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:58:04 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:58:05 - SSH > debug1: Server host key: ECDSA c5:37:3f:46:56:89:73:4c:55:ed:9e:14:cf:d6:14:4a
. 2016.04.16 19:58:05 - SSH > Warning: Permanently added '213.152.161.86' (ECDSA) to the list of known hosts.
. 2016.04.16 19:58:05 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:58:05 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:58:05 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:58:05 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:58:05 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:58:06 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:58:09 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:58:09 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:58:09 - SSH > debug1: Trying private key: /home/gene/.airvpn/c15f1de93e7296f472f36cbeb9c0ee343cce4c2219d935e7cfe076c2123b035e.tmp.key
. 2016.04.16 19:58:09 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:58:09 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:58:10 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:58:10 - SSH > Authenticated to 213.152.161.86 ([213.152.161.86]:22).
. 2016.04.16 19:58:10 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:58:10 - SSH > debug1: Local connections to LOCALHOST:36869 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:58:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:58:10 - SSH > debug1: Local forwarding listening on ::1 port 36869.
. 2016.04.16 19:58:10 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:58:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:58:10 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 36869.
. 2016.04.16 19:58:10 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:58:10 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:58:10 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:58:10 - SSH > debug1: Connection to port 36869 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:58:10 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:58:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:58:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:58:10 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:58:10 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:36869 [nonblock]
. 2016.04.16 19:58:10 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:36869
. 2016.04.16 19:58:10 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:58:10 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:36869
. 2016.04.16 19:58:10 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:58:10 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:58:10 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:58:15 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:36869, sid=14bc0c47 64e10f18
. 2016.04.16 19:58:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:58:17 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:58:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:58:17 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:58:17 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:58:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:58:17 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:58:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:58:24 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:58:24 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:58:24 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:58:24 - Disconnecting
. 2016.04.16 19:58:24 - Connection terminated.
I 2016.04.16 19:58:27 - Checking authorization ...
! 2016.04.16 19:58:28 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2016.04.16 19:58:28 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:58:28 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:58:28 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:58:28 - SSH > debug1: Connecting to 213.152.161.86 [213.152.161.86] port 22.
. 2016.04.16 19:58:28 - SSH > debug1: Connection established.
. 2016.04.16 19:58:28 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:58:28 - SSH > debug1: identity file /home/gene/.airvpn/cd493dc1ff580842169346efe122fbebb61831aea946a4ffbec9a13e6166159d.tmp.key type -1
. 2016.04.16 19:58:28 - SSH > debug1: identity file /home/gene/.airvpn/cd493dc1ff580842169346efe122fbebb61831aea946a4ffbec9a13e6166159d.tmp.key-cert type -1
. 2016.04.16 19:58:28 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:58:28 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:58:29 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:58:29 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:58:29 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:58:29 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:58:29 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:58:29 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:58:29 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:58:29 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:58:30 - SSH > debug1: Server host key: ECDSA c5:37:3f:46:56:89:73:4c:55:ed:9e:14:cf:d6:14:4a
. 2016.04.16 19:58:30 - SSH > Warning: Permanently added '213.152.161.86' (ECDSA) to the list of known hosts.
. 2016.04.16 19:58:30 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:58:30 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:58:30 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:58:30 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:58:30 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:58:31 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:58:31 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:58:31 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:58:31 - SSH > debug1: Trying private key: /home/gene/.airvpn/cd493dc1ff580842169346efe122fbebb61831aea946a4ffbec9a13e6166159d.tmp.key
. 2016.04.16 19:58:31 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:58:31 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:58:32 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:58:32 - SSH > Authenticated to 213.152.161.86 ([213.152.161.86]:22).
. 2016.04.16 19:58:32 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:58:32 - SSH > debug1: Local connections to LOCALHOST:30964 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:58:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:58:32 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:58:32 - SSH > debug1: Local forwarding listening on ::1 port 30964.
. 2016.04.16 19:58:32 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:58:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:58:32 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 30964.
. 2016.04.16 19:58:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:58:32 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:58:32 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:58:32 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:58:32 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:30964 [nonblock]
. 2016.04.16 19:58:32 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:58:32 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:30964
. 2016.04.16 19:58:32 - SSH > debug1: Connection to port 30964 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:58:32 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:58:32 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:58:32 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:30964
. 2016.04.16 19:58:32 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:58:32 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:58:32 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:58:34 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:30964, sid=a7205de9 f699e834
. 2016.04.16 19:58:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:58:36 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:58:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:58:36 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:58:36 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:58:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:58:36 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:58:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:58:49 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:58:49 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:58:49 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:58:49 - Disconnecting
. 2016.04.16 19:58:49 - Connection terminated.
I 2016.04.16 19:58:52 - Checking authorization ...
! 2016.04.16 19:58:55 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2016.04.16 19:58:55 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:58:55 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:58:55 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:58:55 - SSH > debug1: Connecting to 213.152.161.86 [213.152.161.86] port 22.
. 2016.04.16 19:58:55 - SSH > debug1: Connection established.
. 2016.04.16 19:58:55 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:58:55 - SSH > debug1: identity file /home/gene/.airvpn/cf5b1e3429c96f7dc5eba40ecab896c8580aa9a0d67c91eccbf5f708bad42986.tmp.key type -1
. 2016.04.16 19:58:55 - SSH > debug1: identity file /home/gene/.airvpn/cf5b1e3429c96f7dc5eba40ecab896c8580aa9a0d67c91eccbf5f708bad42986.tmp.key-cert type -1
. 2016.04.16 19:58:55 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:58:55 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:58:57 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:58:57 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:58:57 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:58:57 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:58:57 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:58:57 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:58:57 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:58:57 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:58:59 - SSH > debug1: Server host key: ECDSA c5:37:3f:46:56:89:73:4c:55:ed:9e:14:cf:d6:14:4a
. 2016.04.16 19:58:59 - SSH > Warning: Permanently added '213.152.161.86' (ECDSA) to the list of known hosts.
. 2016.04.16 19:58:59 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:58:59 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:58:59 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:58:59 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:58:59 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:59:00 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:59:01 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:59:01 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:59:01 - SSH > debug1: Trying private key: /home/gene/.airvpn/cf5b1e3429c96f7dc5eba40ecab896c8580aa9a0d67c91eccbf5f708bad42986.tmp.key
. 2016.04.16 19:59:01 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:59:01 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:59:02 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:59:02 - SSH > Authenticated to 213.152.161.86 ([213.152.161.86]:22).
. 2016.04.16 19:59:02 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:59:02 - SSH > debug1: Local connections to LOCALHOST:63054 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:59:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:59:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:59:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:59:02 - SSH > debug1: Local forwarding listening on ::1 port 63054.
. 2016.04.16 19:59:02 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:59:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:59:02 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:59:02 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 63054.
. 2016.04.16 19:59:02 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:59:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:63054 [nonblock]
. 2016.04.16 19:59:02 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:59:02 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:63054
. 2016.04.16 19:59:02 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:59:02 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:59:02 - SSH > debug1: Connection to port 63054 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:59:02 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:63054
. 2016.04.16 19:59:02 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:59:02 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:59:02 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:59:02 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:59:05 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:63054, sid=e7d7a629 e905b123
. 2016.04.16 19:59:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:59:06 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:59:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:59:06 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:59:06 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:59:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:59:06 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:59:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:59:13 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:59:13 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:59:13 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:59:13 - Disconnecting
. 2016.04.16 19:59:13 - Connection terminated.
I 2016.04.16 19:59:16 - Checking authorization ...
! 2016.04.16 19:59:17 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2016.04.16 19:59:17 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:59:17 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:59:17 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:59:17 - SSH > debug1: Connecting to 213.152.161.86 [213.152.161.86] port 22.
. 2016.04.16 19:59:18 - SSH > debug1: Connection established.
. 2016.04.16 19:59:18 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:59:18 - SSH > debug1: identity file /home/gene/.airvpn/02f1df9eaf411faadaa224f8f0648f4d39acacbbb2d779c69b8345b83433a593.tmp.key type -1
. 2016.04.16 19:59:18 - SSH > debug1: identity file /home/gene/.airvpn/02f1df9eaf411faadaa224f8f0648f4d39acacbbb2d779c69b8345b83433a593.tmp.key-cert type -1
. 2016.04.16 19:59:18 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:59:18 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:59:20 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:59:20 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:59:20 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:59:20 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:59:20 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:59:20 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:59:20 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:59:20 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:59:22 - SSH > debug1: Server host key: ECDSA c5:37:3f:46:56:89:73:4c:55:ed:9e:14:cf:d6:14:4a
. 2016.04.16 19:59:22 - SSH > Warning: Permanently added '213.152.161.86' (ECDSA) to the list of known hosts.
. 2016.04.16 19:59:22 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:59:22 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:59:22 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:59:22 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:59:22 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:59:23 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:59:24 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:59:24 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:59:24 - SSH > debug1: Trying private key: /home/gene/.airvpn/02f1df9eaf411faadaa224f8f0648f4d39acacbbb2d779c69b8345b83433a593.tmp.key
. 2016.04.16 19:59:24 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:59:24 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:59:25 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:59:25 - SSH > Authenticated to 213.152.161.86 ([213.152.161.86]:22).
. 2016.04.16 19:59:25 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:59:25 - SSH > debug1: Local connections to LOCALHOST:43555 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:59:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:59:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:59:25 - SSH > debug1: Local forwarding listening on ::1 port 43555.
. 2016.04.16 19:59:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:59:25 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:59:25 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 43555.
. 2016.04.16 19:59:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:59:25 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:59:25 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:59:25 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:59:25 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:43555 [nonblock]
. 2016.04.16 19:59:25 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:59:25 - SSH > debug1: Connection to port 43555 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:59:25 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:43555
. 2016.04.16 19:59:25 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:59:25 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:59:25 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:43555
. 2016.04.16 19:59:28 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:59:28 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:59:28 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:59:30 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:43555, sid=094b3dde cb375ec6
. 2016.04.16 19:59:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:59:34 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:59:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:59:34 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:59:34 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:59:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:59:34 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:59:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 19:59:41 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 19:59:41 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 19:59:41 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 19:59:41 - Disconnecting
. 2016.04.16 19:59:41 - Connection terminated.
I 2016.04.16 19:59:44 - Checking authorization ...
! 2016.04.16 19:59:47 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2016.04.16 19:59:47 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 19:59:47 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 19:59:47 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 19:59:47 - SSH > debug1: Connecting to 213.152.161.86 [213.152.161.86] port 22.
. 2016.04.16 19:59:48 - SSH > debug1: Connection established.
. 2016.04.16 19:59:48 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 19:59:48 - SSH > debug1: identity file /home/gene/.airvpn/a739f84019048a70933e61bcd8b9ee797ac61138097a10e31d722b910fb06caa.tmp.key type -1
. 2016.04.16 19:59:48 - SSH > debug1: identity file /home/gene/.airvpn/a739f84019048a70933e61bcd8b9ee797ac61138097a10e31d722b910fb06caa.tmp.key-cert type -1
. 2016.04.16 19:59:48 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 19:59:48 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 19:59:48 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 19:59:48 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 19:59:48 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 19:59:50 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 19:59:50 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:59:50 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 19:59:50 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 19:59:50 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 19:59:52 - SSH > debug1: Server host key: ECDSA c5:37:3f:46:56:89:73:4c:55:ed:9e:14:cf:d6:14:4a
. 2016.04.16 19:59:52 - SSH > Warning: Permanently added '213.152.161.86' (ECDSA) to the list of known hosts.
. 2016.04.16 19:59:52 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 19:59:52 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 19:59:52 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 19:59:52 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 19:59:52 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 19:59:53 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 19:59:54 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 19:59:54 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 19:59:54 - SSH > debug1: Trying private key: /home/gene/.airvpn/a739f84019048a70933e61bcd8b9ee797ac61138097a10e31d722b910fb06caa.tmp.key
. 2016.04.16 19:59:54 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 19:59:54 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 19:59:54 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 19:59:54 - SSH > Authenticated to 213.152.161.86 ([213.152.161.86]:22).
. 2016.04.16 19:59:54 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 19:59:54 - SSH > debug1: Local connections to LOCALHOST:55405 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 19:59:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 19:59:54 - SSH > debug1: Local forwarding listening on ::1 port 55405.
. 2016.04.16 19:59:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 19:59:54 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 19:59:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:59:54 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 55405.
. 2016.04.16 19:59:54 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 19:59:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 19:59:54 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 19:59:54 - SSH > debug1: Entering interactive session.
. 2016.04.16 19:59:54 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 19:59:54 - SSH > debug1: Connection to port 55405 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 19:59:54 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 19:59:54 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:55405 [nonblock]
. 2016.04.16 19:59:55 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:55405
. 2016.04.16 19:59:55 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 19:59:55 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55405
. 2016.04.16 19:59:55 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 19:59:55 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 19:59:55 - SSH > debug1: Remote: Forced command.
. 2016.04.16 19:59:57 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:55405, sid=96656a3a 60374480
. 2016.04.16 19:59:58 - Updating systems & servers data ...
. 2016.04.16 19:59:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 19:59:59 - OpenVPN > Validating certificate key usage
. 2016.04.16 19:59:59 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 19:59:59 - OpenVPN > VERIFY KU OK
. 2016.04.16 19:59:59 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 19:59:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 19:59:59 - OpenVPN > VERIFY EKU OK
. 2016.04.16 19:59:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 20:00:00 - Systems & servers data update completed
. 2016.04.16 20:00:07 - OpenVPN > Connection reset, restarting [0]
. 2016.04.16 20:00:07 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.04.16 20:00:07 - OpenVPN > Restart pause, 5 second(s)
! 2016.04.16 20:00:07 - Disconnecting
. 2016.04.16 20:00:07 - Connection terminated.
I 2016.04.16 20:00:10 - Checking authorization ...
! 2016.04.16 20:00:11 - Connecting to Skat (Netherlands, Alblasserdam)
. 2016.04.16 20:00:11 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014
. 2016.04.16 20:00:11 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2016.04.16 20:00:11 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2016.04.16 20:00:11 - SSH > debug1: Connecting to 213.152.161.75 [213.152.161.75] port 22.
. 2016.04.16 20:00:13 - SSH > debug1: Connection established.
. 2016.04.16 20:00:13 - SSH > debug1: permanently_set_uid: 0/0
. 2016.04.16 20:00:13 - SSH > debug1: identity file /home/gene/.airvpn/738ce4aaca250909ecd652ea04e607e8614a1a3c46b4aadb502eb598c4501323.tmp.key type -1
. 2016.04.16 20:00:13 - SSH > debug1: identity file /home/gene/.airvpn/738ce4aaca250909ecd652ea04e607e8614a1a3c46b4aadb502eb598c4501323.tmp.key-cert type -1
. 2016.04.16 20:00:13 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2016.04.16 20:00:13 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.6
. 2016.04.16 20:00:15 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.04.16 20:00:15 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000
. 2016.04.16 20:00:15 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2016.04.16 20:00:17 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2016.04.16 20:00:17 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 20:00:17 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none
. 2016.04.16 20:00:17 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT
. 2016.04.16 20:00:17 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2016.04.16 20:00:21 - SSH > debug1: Server host key: ECDSA 7c:46:ef:5e:af:2d:97:67:46:5e:5f:f1:94:bb:34:20
. 2016.04.16 20:00:21 - SSH > Warning: Permanently added '213.152.161.75' (ECDSA) to the list of known hosts.
. 2016.04.16 20:00:21 - SSH > debug1: ssh_ecdsa_verify: signature correct
. 2016.04.16 20:00:21 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2016.04.16 20:00:21 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2016.04.16 20:00:21 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2016.04.16 20:00:21 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2016.04.16 20:00:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2016.04.16 20:00:25 - SSH > debug1: Authentications that can continue: publickey,password
. 2016.04.16 20:00:25 - SSH > debug1: Next authentication method: publickey
. 2016.04.16 20:00:25 - SSH > debug1: Trying private key: /home/gene/.airvpn/738ce4aaca250909ecd652ea04e607e8614a1a3c46b4aadb502eb598c4501323.tmp.key
. 2016.04.16 20:00:25 - SSH > debug1: key_parse_private2: missing begin marker
. 2016.04.16 20:00:25 - SSH > debug1: read PEM private key done: type RSA
. 2016.04.16 20:00:29 - SSH > debug1: Authentication succeeded (publickey).
. 2016.04.16 20:00:29 - SSH > Authenticated to 213.152.161.75 ([213.152.161.75]:22).
. 2016.04.16 20:00:29 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014
. 2016.04.16 20:00:29 - SSH > debug1: Local connections to LOCALHOST:11508 forwarded to remote address 127.0.0.1:2018
. 2016.04.16 20:00:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.04.16 20:00:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.16 20:00:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 20:00:29 - SSH > debug1: Local forwarding listening on ::1 port 11508.
. 2016.04.16 20:00:29 - SSH > debug1: channel 0: new [port listener]
. 2016.04.16 20:00:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 20:00:29 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 11508.
. 2016.04.16 20:00:29 - SSH > debug1: channel 1: new [port listener]
. 2016.04.16 20:00:29 - OpenVPN > Socket Buffers: R=[87380->262144] S=[16384->262144]
. 2016.04.16 20:00:29 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2016.04.16 20:00:29 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:11508 [nonblock]
. 2016.04.16 20:00:29 - SSH > debug1: Entering interactive session.
. 2016.04.16 20:00:29 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:11508
. 2016.04.16 20:00:29 - SSH > debug1: Connection to port 11508 forwarding to 127.0.0.1 port 2018 requested.
. 2016.04.16 20:00:29 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.04.16 20:00:29 - SSH > debug1: channel 2: new [direct-tcpip]
. 2016.04.16 20:00:29 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:11508
. 2016.04.16 20:00:48 - SSH > debug1: Remote: Pty allocation disabled.
. 2016.04.16 20:00:48 - SSH > debug1: Remote: X11 forwarding disabled.
. 2016.04.16 20:00:48 - SSH > debug1: Remote: Forced command.
. 2016.04.16 20:00:50 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:11508, sid=5d276808 dab82f85
. 2016.04.16 20:00:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.16 20:00:52 - OpenVPN > Validating certificate key usage
. 2016.04.16 20:00:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.16 20:00:52 - OpenVPN > VERIFY KU OK
. 2016.04.16 20:00:52 - OpenVPN > Validating certificate extended key usage
. 2016.04.16 20:00:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.16 20:00:52 - OpenVPN > VERIFY EKU OK
. 2016.04.16 20:00:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.16 20:01:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 20:01:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 20:01:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.16 20:01:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.16 20:01:11 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.04.16 20:01:11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:11508
. 2016.04.16 20:01:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.16 20:01:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.5.47 255.255.0.0'
. 2016.04.16 20:01:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.16 20:01:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.16 20:01:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.16 20:01:23 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.16 20:01:23 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.16 20:01:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.16 20:01:23 - OpenVPN > ROUTE_GATEWAY 192.168.15.1/255.255.255.0 IFACE=wlan0 HWADDR=5c:e0:c5:9e:39:19
. 2016.04.16 20:01:23 - OpenVPN > TUN/TAP device tun0 opened
. 2016.04.16 20:01:23 - OpenVPN > TUN/TAP TX queue length set to 100
. 2016.04.16 20:01:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.16 20:01:23 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2016.04.16 20:01:23 - OpenVPN > /sbin/ip addr add dev tun0 10.50.5.47/16 broadcast 10.50.255.255
. 2016.04.16 20:01:28 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.15.1
. 2016.04.16 20:01:28 - OpenVPN > RTNETLINK answers: File exists
. 2016.04.16 20:01:28 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2
. 2016.04.16 20:01:28 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.50.0.1
. 2016.04.16 20:01:28 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.50.0.1
. 2016.04.16 20:01:28 - OpenVPN > /sbin/ip route add 213.152.161.75/32 via 192.168.15.1
. 2016.04.16 20:01:28 - Starting Management Interface
. 2016.04.16 20:01:28 - OpenVPN > Initialization Sequence Completed
I 2016.04.16 20:01:28 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup
I 2016.04.16 20:01:28 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
I 2016.04.16 20:01:28 - Flushing DNS
I 2016.04.16 20:01:29 - Checking route
W 2016.04.16 20:01:39 - Checking route, 1° try failed (The request timed out)
W 2016.04.16 20:01:49 - Checking route, 2° try failed (The request timed out)
W 2016.04.16 20:02:04 - Checking info, 1° try failed (The request timed out)
I 2016.04.16 20:02:09 - Checking DNS
W 2016.04.16 20:02:21 - Checking DNS, 1° try failed (The request timed out)
W 2016.04.16 20:02:31 - Checking DNS, 2° try failed (The request timed out)
W 2016.04.16 20:02:41 - Checking DNS, 3° try failed (The request timed out)
W 2016.04.16 20:02:51 - Checking DNS, 4° try failed (The request timed out)
! 2016.04.16 20:02:59 - Connected.
. 2016.04.16 20:02:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2016.04.16 20:02:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

 

I've also been having more and more failed routing checks because of timeouts as you can see. I find changing servers often helps and servers in some countries tend to be less reliable (Netherlands and Singapore).

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...