Jump to content
Not connected, Your IP: 52.14.196.150

Recommended Posts

Hi!

I am new to VPN.

I use Win 8.1.

Network lock mode - Automatic (network was locked - closed lock in right corner)

DNS Switch mode - Automatic

Check if the tunnel uses AirVPN DNS - checked.

I used several IP and DNS tests. IP was always as per AirVPN - no issues, however https://ipleak.net/ and https://dnsleaktest.com/ easily showed DNS address of my ISP (but not the AirVPN server).

Logs below:

I 2016.04.25 19:50:39 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.04.25 19:50:39 - Reading options from C:\Users\1\AppData\Local\AirVPN\AirVPN.xml
. 2016.04.25 19:50:39 - Profile options not found, using defaults.
. 2016.04.25 19:50:40 - Data Path: C:\Users\1\AppData\Local\AirVPN
. 2016.04.25 19:50:40 - App Path: C:\Program Files\AirVPN
. 2016.04.25 19:50:40 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.04.25 19:50:40 - Command line arguments (1): path="home"
. 2016.04.25 19:50:40 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.04.25 19:50:40 - Updating systems & servers data ...
. 2016.04.25 19:50:40 - Cannot find tunnel adapter.
E 2016.04.25 19:50:40 - OpenVPN Driver - Not available
I 2016.04.25 19:50:40 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.04.25 19:50:40 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.04.25 19:50:40 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.04.25 19:50:40 - Ready
. 2016.04.25 19:50:41 - Systems & servers data update completed
I 2016.04.25 19:51:51 - Checking login ...
! 2016.04.25 19:51:52 - Logged in.
. 2016.04.25 19:59:40 - Updating systems & servers data ...
. 2016.04.25 19:59:41 - Systems & servers data update completed
. 2016.04.25 19:59:49 - Updating systems & servers data ...
. 2016.04.25 19:59:50 - Systems & servers data update completed
I 2016.04.25 20:00:17 - Session starting.
. 2016.04.25 20:00:17 - Cannot find tunnel adapter.
! 2016.04.25 20:00:17 - Installing tunnel driver
I 2016.04.25 20:01:37 - IPv6 disabled.
I 2016.04.25 20:01:37 - Checking authorization ...
! 2016.04.25 20:01:38 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.04.25 20:01:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.25 20:01:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.25 20:01:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.25 20:01:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.25 20:01:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:01:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:01:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.04.25 20:01:38 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.25 20:01:38 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.04.25 20:01:38 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=95364e2a 5864a971
. 2016.04.25 20:01:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.25 20:01:38 - OpenVPN > Validating certificate key usage
. 2016.04.25 20:01:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.25 20:01:38 - OpenVPN > VERIFY KU OK
. 2016.04.25 20:01:38 - OpenVPN > Validating certificate extended key usage
. 2016.04.25 20:01:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.25 20:01:38 - OpenVPN > VERIFY EKU OK
. 2016.04.25 20:01:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.25 20:01:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 20:01:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:01:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 20:01:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:01:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.25 20:01:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.04.25 20:01:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.25 20:01:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.38.170 255.255.0.0'
. 2016.04.25 20:01:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.25 20:01:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.25 20:01:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.25 20:01:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.25 20:01:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.25 20:01:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.25 20:01:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.25 20:01:43 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.25 20:01:43 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{77AC19D6-E4EF-4704-AEDD-D5C28E11D143}.tap
. 2016.04.25 20:01:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.04.25 20:01:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.38.170/255.255.0.0 [sUCCEEDED]
. 2016.04.25 20:01:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.38.170/255.255.0.0 on interface {77AC19D6-E4EF-4704-AEDD-D5C28E11D143} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.04.25 20:01:43 - OpenVPN > Successful ARP Flush on interface [28] {77AC19D6-E4EF-4704-AEDD-D5C28E11D143}
. 2016.04.25 20:01:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.04.25 20:01:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.04.25 20:01:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.04.25 20:01:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:01:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 3
. 2016.04.25 20:01:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.04.25 20:01:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:01:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 20:01:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.04.25 20:01:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:01:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 20:01:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.04.25 20:01:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:01:48 - Starting Management Interface
. 2016.04.25 20:01:48 - OpenVPN > Initialization Sequence Completed
I 2016.04.25 20:01:48 - DNS of a network adapter forced (Intel® Centrino® Wireless-N 2200)
I 2016.04.25 20:01:48 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.04.25 20:01:48 - Flushing DNS
I 2016.04.25 20:01:48 - Checking route
I 2016.04.25 20:01:51 - Checking DNS
! 2016.04.25 20:01:52 - Connected.
. 2016.04.25 20:01:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.04.25 20:01:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.04.25 20:29:53 - Disconnecting
. 2016.04.25 20:29:53 - Management - Send 'signal SIGTERM'
. 2016.04.25 20:29:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.25 20:29:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.04.25 20:29:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.04.25 20:29:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 20:29:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.04.25 20:29:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 20:29:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 20:29:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 20:29:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 20:29:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 20:29:58 - OpenVPN > Closing TUN/TAP interface
. 2016.04.25 20:29:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.04.25 20:29:58 - Connection terminated.
I 2016.04.25 20:29:58 - DNS of a network adapter restored to original settings (Intel® Centrino® Wireless-N 2200)
I 2016.04.25 20:29:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.04.25 20:29:58 - IPv6 restored.
! 2016.04.25 20:29:58 - Session terminated.
. 2016.04.25 20:30:00 - Updating systems & servers data ...
. 2016.04.25 20:30:01 - Systems & servers data update completed
! 2016.04.25 20:30:08 - Activation of Network Lock - Windows Firewall
I 2016.04.25 20:30:17 - Session starting.
I 2016.04.25 20:30:17 - IPv6 disabled.
I 2016.04.25 20:30:17 - Checking authorization ...
! 2016.04.25 20:30:17 - Connecting to Ukdah (Canada, Toronto, Ontario)
. 2016.04.25 20:30:17 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.25 20:30:17 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.25 20:30:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.25 20:30:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.25 20:30:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:30:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:30:17 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.04.25 20:30:17 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.25 20:30:17 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.58:443
. 2016.04.25 20:30:17 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.58:443, sid=bec70ac5 9a22f364
. 2016.04.25 20:30:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.25 20:30:18 - OpenVPN > Validating certificate key usage
. 2016.04.25 20:30:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.25 20:30:18 - OpenVPN > VERIFY KU OK
. 2016.04.25 20:30:18 - OpenVPN > Validating certificate extended key usage
. 2016.04.25 20:30:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.25 20:30:18 - OpenVPN > VERIFY EKU OK
. 2016.04.25 20:30:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.25 20:30:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 20:30:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:30:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 20:30:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 20:30:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.25 20:30:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.58:443
. 2016.04.25 20:30:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.25 20:30:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.15 255.255.0.0'
. 2016.04.25 20:30:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.25 20:30:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.25 20:30:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.25 20:30:23 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.25 20:30:23 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.25 20:30:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.25 20:30:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.25 20:30:23 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.25 20:30:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{77AC19D6-E4EF-4704-AEDD-D5C28E11D143}.tap
. 2016.04.25 20:30:23 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.04.25 20:30:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.4.15/255.255.0.0 [sUCCEEDED]
. 2016.04.25 20:30:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.4.15/255.255.0.0 on interface {77AC19D6-E4EF-4704-AEDD-D5C28E11D143} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.04.25 20:30:23 - OpenVPN > Successful ARP Flush on interface [28] {77AC19D6-E4EF-4704-AEDD-D5C28E11D143}
. 2016.04.25 20:30:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.04.25 20:30:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.58 MASK 255.255.255.255 192.168.0.1
. 2016.04.25 20:30:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.04.25 20:30:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:30:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 3
. 2016.04.25 20:30:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.04.25 20:30:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:30:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 20:30:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.04.25 20:30:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:30:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 20:30:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.04.25 20:30:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 20:30:28 - Starting Management Interface
. 2016.04.25 20:30:28 - OpenVPN > Initialization Sequence Completed
I 2016.04.25 20:30:28 - DNS of a network adapter forced (Intel® Centrino® Wireless-N 2200)
I 2016.04.25 20:30:28 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.04.25 20:30:28 - Flushing DNS
I 2016.04.25 20:30:28 - Checking route
I 2016.04.25 20:30:30 - Checking DNS
! 2016.04.25 20:30:30 - Connected.
. 2016.04.25 20:30:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.04.25 20:30:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.04.25 21:00:10 - Updating systems & servers data ...
. 2016.04.25 21:00:12 - Systems & servers data update completed
! 2016.04.25 21:24:10 - Disconnecting
. 2016.04.25 21:24:10 - Management - Send 'signal SIGTERM'
. 2016.04.25 21:24:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.04.25 21:24:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.04.25 21:24:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.58 MASK 255.255.255.255 192.168.0.1
. 2016.04.25 21:24:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.04.25 21:24:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 21:24:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 21:24:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:15 - OpenVPN > Closing TUN/TAP interface
. 2016.04.25 21:24:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.04.25 21:24:15 - Connection terminated.
I 2016.04.25 21:24:15 - DNS of a network adapter restored to original settings (Intel® Centrino® Wireless-N 2200)
I 2016.04.25 21:24:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.04.25 21:24:15 - IPv6 restored.
! 2016.04.25 21:24:15 - Session terminated.
I 2016.04.25 21:24:21 - Session starting.
I 2016.04.25 21:24:21 - IPv6 disabled.
I 2016.04.25 21:24:21 - Checking authorization ...
! 2016.04.25 21:24:22 - Connecting to Tyl (Canada, Toronto, Ontario)
. 2016.04.25 21:24:22 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.04.25 21:24:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.04.25 21:24:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.04.25 21:24:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.04.25 21:24:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 21:24:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 21:24:22 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.04.25 21:24:22 - OpenVPN > UDPv4 link local: [undef]
. 2016.04.25 21:24:22 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.202:443
. 2016.04.25 21:24:22 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.202:443, sid=b0e9eadf 6a79d5a9
. 2016.04.25 21:24:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.25 21:24:22 - OpenVPN > Validating certificate key usage
. 2016.04.25 21:24:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.25 21:24:22 - OpenVPN > VERIFY KU OK
. 2016.04.25 21:24:22 - OpenVPN > Validating certificate extended key usage
. 2016.04.25 21:24:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.25 21:24:22 - OpenVPN > VERIFY EKU OK
. 2016.04.25 21:24:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.25 21:24:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 21:24:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 21:24:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 21:24:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 21:24:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.25 21:24:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.202:443
. 2016.04.25 21:24:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.04.25 21:24:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.36.6 255.255.0.0'
. 2016.04.25 21:24:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.04.25 21:24:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.04.25 21:24:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.04.25 21:24:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.04.25 21:24:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.04.25 21:24:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.04.25 21:24:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.04.25 21:24:31 - OpenVPN > open_tun, tt->ipv6=0
. 2016.04.25 21:24:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{77AC19D6-E4EF-4704-AEDD-D5C28E11D143}.tap
. 2016.04.25 21:24:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.04.25 21:24:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.36.6/255.255.0.0 [sUCCEEDED]
. 2016.04.25 21:24:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.36.6/255.255.0.0 on interface {77AC19D6-E4EF-4704-AEDD-D5C28E11D143} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.04.25 21:24:31 - OpenVPN > Successful ARP Flush on interface [28] {77AC19D6-E4EF-4704-AEDD-D5C28E11D143}
. 2016.04.25 21:24:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.04.25 21:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.202 MASK 255.255.255.255 192.168.0.1
. 2016.04.25 21:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.04.25 21:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 3
. 2016.04.25 21:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.04.25 21:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 21:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.04.25 21:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.04.25 21:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.04.25 21:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.04.25 21:24:36 - Starting Management Interface
. 2016.04.25 21:24:36 - OpenVPN > Initialization Sequence Completed
I 2016.04.25 21:24:36 - DNS of a network adapter forced (Intel® Centrino® Wireless-N 2200)
I 2016.04.25 21:24:36 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.04.25 21:24:36 - Flushing DNS
I 2016.04.25 21:24:36 - Checking route
I 2016.04.25 21:24:38 - Checking DNS
! 2016.04.25 21:24:38 - Connected.
. 2016.04.25 21:24:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.04.25 21:24:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.04.25 21:30:21 - Updating systems & servers data ...
. 2016.04.25 21:30:22 - Systems & servers data update completed
. 2016.04.25 22:00:29 - Updating systems & servers data ...
. 2016.04.25 22:00:31 - Systems & servers data update completed
. 2016.04.25 22:24:28 - OpenVPN > TLS: soft reset sec=0 bytes=4299105205/0 pkts=4582344/0
. 2016.04.25 22:24:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.04.25 22:24:28 - OpenVPN > Validating certificate key usage
. 2016.04.25 22:24:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.04.25 22:24:28 - OpenVPN > VERIFY KU OK
. 2016.04.25 22:24:28 - OpenVPN > Validating certificate extended key usage
. 2016.04.25 22:24:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.04.25 22:24:28 - OpenVPN > VERIFY EKU OK
. 2016.04.25 22:24:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.04.25 22:24:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 22:24:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 22:24:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.04.25 22:24:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.04.25 22:24:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.04.25 22:30:37 - Updating systems & servers data ...
. 2016.04.25 22:30:38 - Systems & servers data update completed
. 2016.04.25 23:00:42 - Updating systems & servers data ...
. 2016.04.25 23:00:44 - Systems & servers data update completed

 

I am not an expert, but is that ok?

I 2016.04.25 21:24:36 - DNS of a network adapter forced (Intel® Centrino® Wireless-N 2200)
I 2016.04.25 21:24:36 - DNS of a network adapter forced (TAP-Windows Adapter V9)

 

What I need to do?

 

Thanks!

Share this post


Link to post

I disabled IPv6 in my Wi-Fi router (through Network and Sharing Center) by clearing check box in Wi-Fi Properties. This seems to solve the problem, as both mentioned web sites now see only my AirVPN DNS (not my ISP DNS as before).

Now I am puzzled if I missed some important guides/tutorials on what to do when you are new to AirVPN. I looked through How-To subforum and other parts, used search but didn't find something about first steps.

Share this post


Link to post

. 2016.04.25 21:24:15 - Connection terminated.

 

This line is before the two lines you are showing.

 

Eddie client (VPN) is turned off and returned your computer to the DNS of your ISP.

The eddie client does this so you can still use the internet;

If eddie client left the AirVPN DNS open, in your network adapter; you would not be able to use the internet unless AirVPN is connected.

 

If you run those tests after disconnecting the eddie client (VPN); those tests will show your IP address given to you by your ISP.

 

Your personal IP is hidden when eddie client(VPN) s running.

 

This is how I understand it from your log and statement.

Share this post


Link to post

LastChance, I agree - you are right here with explanation of to ISP DNS.

I run tests while connected to AirVPN. I mentioned that Network lock was activated, so I could have internet connection only through AirVPN.

So, either Eddie failed to disable IPv6 or ... 

I still think that the problem is in IPv6, as after disabling it for router - no DNS leaks.

I am far from being an expert in computers and networks...

Share this post


Link to post
Guest

LastChance, I agree - you are right here with explanation of to ISP DNS.

I run tests while connected to AirVPN. I mentioned that Network lock was activated, so I could have internet connection only through AirVPN.

So, either Eddie failed to disable IPv6 or ... 

I still think that the problem is in IPv6, as after disabling it for router - no DNS leaks.

I am far from being an expert in computers and networks...

 

Highly likely IPv6, it is quite problematic I disabled IPv6 on my computer ages ago I had to leave a provider cuz they made IPv6 mandatory.

Share this post


Link to post

Highly likely IPv6, it is quite problematic I disabled IPv6 on my computer ages ago I had to leave a provider cuz they made IPv6 mandatory.

Agree, looks like it's the cause. Will keep IPv6 disabled for router.

 

Yes, eddie client should have disabled IPv6.

 

Go to Preferences>Advance; to see if it is disabled in Eddie Client.

That's I am talking about! Eddie has IPv6 disabled in Preferences. Even log tells that IPv6 disabled as the first action on session start, see below:

I 2016.04.25 21:24:21 - Session starting.
I 2016.04.25 21:24:21 - IPv6 disabled.
I 2016.04.25 21:24:21 - Checking authorization ...
! 2016.04.25 21:24:22 - Connecting to Tyl (Canada, Toronto, Ontario)

however that's not true as DNS leaks and disabling IPv6 for router solves the issue.

 

Anyway, now it becomes Eddie's issue, I guess: "unable to disable IPv6 even if it's selected in Preferences". I don't think I am the first who discovered it.

For new users: Disable IPv6 for your router in Windows - it will solve DNS leak.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...