Jump to content
Not connected, Your IP: 3.144.20.66
iditarod656

airvpn broke my internet connection

Recommended Posts

I already tried this:

___________________________________

- Go to Control Panel
- Click Network and Internet
- Click Network and Sharing Center
- Click Change adapter settings
- Right click your network
- Click Properties
- Click Internet Protocol Version 4 (TCP/IPv4)
- Click Properties
- Select Obtain DNS server address automatically.
- Click OK
- Click Close
___________________________________
 
and it's still a problem.  If I completely uninstall airvpn, I can't get a connection.
 
Do I need to try revo uninstaller?

Share this post


Link to post

What is "ping 8.8.8.8"?   Seems to me that pinging 8.8.8.8, whatever that is, is not very user friendly.

 

Here are some logs:

. 2016.06.10 08:07:16 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 08:07:16 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.06.10 08:07:16 - OpenVPN > Exiting due to fatal error
! 2016.06.10 08:07:16 - Disconnecting
. 2016.06.10 08:07:16 - Connection terminated.
I 2016.06.10 08:07:19 - Checking authorization ...
! 2016.06.10 08:07:20 - Connecting to Cetus (Canada, Vancouver)
. 2016.06.10 08:07:20 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 08:07:20 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 08:07:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 08:07:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 08:07:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:07:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:07:20 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 08:07:20 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 08:07:20 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.249.195:443
. 2016.06.10 08:07:20 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.249.195:443, sid=a228708e 2ab14ca5
. 2016.06.10 08:07:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 08:07:20 - OpenVPN > Validating certificate key usage
. 2016.06.10 08:07:20 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 08:07:20 - OpenVPN > VERIFY KU OK
. 2016.06.10 08:07:20 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 08:07:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 08:07:20 - OpenVPN > VERIFY EKU OK
. 2016.06.10 08:07:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 08:07:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 08:07:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:07:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 08:07:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:07:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 08:07:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.249.195:443
. 2016.06.10 08:07:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 08:07:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.162 255.255.0.0'
. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 08:07:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 08:07:23 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 08:07:23 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 08:07:23 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.10 08:07:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.162/255.255.0.0 [sUCCEEDED]
. 2016.06.10 08:07:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.162/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.10 08:07:23 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.10 08:07:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.249.195 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:07:28 - Starting Management Interface
. 2016.06.10 08:07:28 - OpenVPN > Initialization Sequence Completed
I 2016.06.10 08:07:28 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 08:07:28 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.10 08:07:28 - Flushing DNS
I 2016.06.10 08:07:28 - Checking route
I 2016.06.10 08:07:28 - Checking DNS
! 2016.06.10 08:07:29 - Connected.
. 2016.06.10 08:07:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.10 08:07:29 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.06.10 08:19:02 - Disconnecting
. 2016.06.10 08:19:02 - Management - Send 'signal SIGTERM'
. 2016.06.10 08:19:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.10 08:19:02 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.249.195 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:07 - OpenVPN > Closing TUN/TAP interface
. 2016.06.10 08:19:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.10 08:19:07 - Connection terminated.
I 2016.06.10 08:19:07 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.10 08:19:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.10 08:19:10 - Checking authorization ...
! 2016.06.10 08:19:11 - Connecting to Alkaid (United States, Chicago, Illinois)
. 2016.06.10 08:19:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 08:19:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 08:19:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 08:19:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 08:19:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:19:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:19:11 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 08:19:11 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 08:19:11 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443
. 2016.06.10 08:19:11 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=770e7584 ddd1def7
. 2016.06.10 08:19:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 08:19:11 - OpenVPN > Validating certificate key usage
. 2016.06.10 08:19:11 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 08:19:11 - OpenVPN > VERIFY KU OK
. 2016.06.10 08:19:11 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 08:19:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 08:19:11 - OpenVPN > VERIFY EKU OK
. 2016.06.10 08:19:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 08:19:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 08:19:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:19:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 08:19:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 08:19:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 08:19:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443
. 2016.06.10 08:19:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 08:19:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.235 255.255.0.0'
. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 08:19:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 08:19:14 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 08:19:14 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 08:19:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.10 08:19:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.235/255.255.0.0 [sUCCEEDED]
. 2016.06.10 08:19:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.235/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.10 08:19:14 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.10 08:19:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.154.82 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 08:19:19 - Starting Management Interface
. 2016.06.10 08:19:19 - OpenVPN > Initialization Sequence Completed
I 2016.06.10 08:19:19 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 08:19:19 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.10 08:19:19 - Flushing DNS
I 2016.06.10 08:19:19 - Checking route
I 2016.06.10 08:19:20 - Checking DNS
! 2016.06.10 08:19:20 - Connected.
. 2016.06.10 08:19:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.10 08:19:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.10 08:37:31 - Updating systems & servers data ...
. 2016.06.10 08:37:32 - Systems & servers data update completed
. 2016.06.10 09:07:32 - Updating systems & servers data ...
. 2016.06.10 09:07:34 - Systems & servers data update completed
. 2016.06.10 09:19:12 - OpenVPN > TLS: soft reset sec=0 bytes=11459049/0 pkts=21958/0
. 2016.06.10 09:19:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 09:19:12 - OpenVPN > Validating certificate key usage
. 2016.06.10 09:19:12 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 09:19:12 - OpenVPN > VERIFY KU OK
. 2016.06.10 09:19:12 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 09:19:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 09:19:12 - OpenVPN > VERIFY EKU OK
. 2016.06.10 09:19:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 09:19:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 09:19:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 09:19:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 09:19:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 09:19:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 09:34:52 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.06.10 09:34:52 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.06.10 09:34:52 - OpenVPN > Exiting due to fatal error
. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.154.82 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 09:34:52 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.06.10 09:34:52 - Disconnecting
. 2016.06.10 09:34:52 - Management - Send 'signal SIGTERM'
. 2016.06.10 09:34:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 09:34:52 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 09:34:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 09:34:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 09:34:52 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 09:34:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 09:34:52 - OpenVPN > Closing TUN/TAP interface
. 2016.06.10 09:34:52 - Connection terminated.
I 2016.06.10 13:27:30 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.10 13:27:30 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.10 13:27:41 - Checking authorization ...
! 2016.06.10 13:27:41 - Connecting to Gemma (Canada, Vancouver)
. 2016.06.10 13:27:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 13:27:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 13:27:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 13:27:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 13:27:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:41 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 13:27:41 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 13:27:41 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443
. 2016.06.10 13:27:42 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=e0212001 c0463cfd
. 2016.06.10 13:27:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 13:27:42 - OpenVPN > Validating certificate key usage
. 2016.06.10 13:27:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 13:27:42 - OpenVPN > VERIFY KU OK
. 2016.06.10 13:27:42 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 13:27:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 13:27:42 - OpenVPN > VERIFY EKU OK
. 2016.06.10 13:27:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 13:27:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 13:27:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 13:27:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 13:27:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2016.06.10 13:27:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 13:27:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'
. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 13:27:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 13:27:47 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 13:27:47 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 13:27:47 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.06.10 13:27:47 - OpenVPN > Exiting due to fatal error
! 2016.06.10 13:27:47 - Disconnecting
. 2016.06.10 13:27:47 - Connection terminated.
I 2016.06.10 13:27:50 - Checking authorization ...
! 2016.06.10 13:27:51 - Connecting to Gemma (Canada, Vancouver)
. 2016.06.10 13:27:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 13:27:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 13:27:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 13:27:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 13:27:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:51 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 13:27:51 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 13:27:51 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443
. 2016.06.10 13:27:51 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=eff770a7 8fe5b7ae
. 2016.06.10 13:27:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 13:27:51 - OpenVPN > Validating certificate key usage
. 2016.06.10 13:27:51 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 13:27:51 - OpenVPN > VERIFY KU OK
. 2016.06.10 13:27:51 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 13:27:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 13:27:51 - OpenVPN > VERIFY EKU OK
. 2016.06.10 13:27:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 13:27:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 13:27:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 13:27:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:27:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 13:27:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2016.06.10 13:27:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 13:27:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'
. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 13:27:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 13:27:55 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 13:27:55 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 13:27:55 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.10 13:27:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.178/255.255.0.0 [sUCCEEDED]
. 2016.06.10 13:27:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.178/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.10 13:27:55 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.10 13:28:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:28:00 - Starting Management Interface
. 2016.06.10 13:28:00 - OpenVPN > Initialization Sequence Completed
I 2016.06.10 13:28:00 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 13:28:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.10 13:28:00 - Flushing DNS
I 2016.06.10 13:28:00 - Checking route
I 2016.06.10 13:28:01 - Checking DNS
! 2016.06.10 13:28:01 - Connected.
. 2016.06.10 13:28:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.10 13:28:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.10 13:28:12 - Updating systems & servers data ...
. 2016.06.10 13:28:13 - Systems & servers data update completed
! 2016.06.10 13:41:39 - Disconnecting
. 2016.06.10 13:41:39 - Management - Send 'signal SIGTERM'
. 2016.06.10 13:41:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.10 13:41:39 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:44 - OpenVPN > Closing TUN/TAP interface
. 2016.06.10 13:41:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.10 13:41:44 - Connection terminated.
I 2016.06.10 13:41:44 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.10 13:41:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.10 13:41:47 - Checking authorization ...
! 2016.06.10 13:41:47 - Connecting to Auva (United States, Dallas, Texas)
. 2016.06.10 13:41:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 13:41:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 13:41:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 13:41:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 13:41:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:41:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:41:48 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 13:41:48 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 13:41:48 - OpenVPN > UDPv4 link remote: [AF_INET]23.88.114.42:443
. 2016.06.10 13:41:48 - OpenVPN > TLS: Initial packet from [AF_INET]23.88.114.42:443, sid=0b25d557 21901f6b
. 2016.06.10 13:41:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 13:41:48 - OpenVPN > Validating certificate key usage
. 2016.06.10 13:41:48 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 13:41:48 - OpenVPN > VERIFY KU OK
. 2016.06.10 13:41:48 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 13:41:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 13:41:48 - OpenVPN > VERIFY EKU OK
. 2016.06.10 13:41:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 13:41:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 13:41:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:41:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 13:41:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 13:41:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 13:41:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]23.88.114.42:443
. 2016.06.10 13:41:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 13:41:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.238 255.255.0.0'
. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 13:41:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 13:41:51 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 13:41:51 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 13:41:51 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.10 13:41:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.5.238/255.255.0.0 [sUCCEEDED]
. 2016.06.10 13:41:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.5.238/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.10 13:41:51 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.10 13:41:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 23.88.114.42 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 13:41:56 - Starting Management Interface
. 2016.06.10 13:41:56 - OpenVPN > Initialization Sequence Completed
I 2016.06.10 13:41:56 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 13:41:56 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.10 13:41:56 - Flushing DNS
I 2016.06.10 13:41:56 - Checking route
I 2016.06.10 13:41:57 - Checking DNS
! 2016.06.10 13:41:57 - Connected.
. 2016.06.10 13:41:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.10 13:41:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.10 13:48:07 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.06.10 13:48:07 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
. 2016.06.10 13:48:07 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.06.10 13:48:07 - OpenVPN > Exiting due to fatal error
. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 23.88.114.42 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:48:07 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 13:48:07 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 13:48:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 13:48:07 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 13:48:07 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 13:48:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 13:48:07 - OpenVPN > Closing TUN/TAP interface
! 2016.06.10 13:48:07 - Disconnecting
. 2016.06.10 13:48:07 - Connection terminated.
I 2016.06.10 13:48:07 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.10 13:48:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
. 2016.06.10 16:23:48 - Updating systems & servers data ...
. 2016.06.10 16:23:50 - Systems & servers data update completed
I 2016.06.10 16:23:53 - Checking authorization ...
! 2016.06.10 16:23:54 - Connecting to Cynosura (Canada, Vancouver)
. 2016.06.10 16:23:54 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 16:23:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 16:23:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 16:23:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 16:23:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:23:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:23:54 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 16:23:54 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 16:23:54 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.21:443
. 2016.06.10 16:23:54 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=85211202 6a4bfc43
. 2016.06.10 16:23:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 16:23:54 - OpenVPN > Validating certificate key usage
. 2016.06.10 16:23:54 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 16:23:54 - OpenVPN > VERIFY KU OK
. 2016.06.10 16:23:54 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 16:23:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 16:23:54 - OpenVPN > VERIFY EKU OK
. 2016.06.10 16:23:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 16:23:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 16:23:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:23:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 16:23:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:23:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 16:23:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2016.06.10 16:23:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 16:23:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.87 255.255.0.0'
. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 16:23:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 16:23:57 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 16:23:57 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 16:23:57 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.06.10 16:23:57 - OpenVPN > Exiting due to fatal error
! 2016.06.10 16:23:57 - Disconnecting
. 2016.06.10 16:23:57 - Connection terminated.
I 2016.06.10 16:24:00 - Checking authorization ...
! 2016.06.10 16:24:01 - Connecting to Cynosura (Canada, Vancouver)
. 2016.06.10 16:24:01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 16:24:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 16:24:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 16:24:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 16:24:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:24:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:24:01 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 16:24:01 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 16:24:01 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.21:443
. 2016.06.10 16:24:01 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=b7e099e8 a614124e
. 2016.06.10 16:24:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 16:24:02 - OpenVPN > Validating certificate key usage
. 2016.06.10 16:24:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 16:24:02 - OpenVPN > VERIFY KU OK
. 2016.06.10 16:24:02 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 16:24:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 16:24:02 - OpenVPN > VERIFY EKU OK
. 2016.06.10 16:24:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 16:24:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 16:24:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:24:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 16:24:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:24:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 16:24:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2016.06.10 16:24:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 16:24:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.87 255.255.0.0'
. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 16:24:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 16:24:07 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 16:24:08 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 16:24:08 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.10 16:24:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.87/255.255.0.0 [sUCCEEDED]
. 2016.06.10 16:24:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.87/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.10 16:24:08 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.10 16:24:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.21 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:24:12 - Starting Management Interface
. 2016.06.10 16:24:12 - OpenVPN > Initialization Sequence Completed
I 2016.06.10 16:24:12 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 16:24:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.10 16:24:14 - Flushing DNS
I 2016.06.10 16:24:14 - Checking route
I 2016.06.10 16:24:17 - Checking DNS
! 2016.06.10 16:24:17 - Connected.
. 2016.06.10 16:24:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.10 16:24:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.06.10 16:25:03 - Disconnecting
. 2016.06.10 16:25:03 - Management - Send 'signal SIGTERM'
. 2016.06.10 16:25:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.10 16:25:03 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.21 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:08 - OpenVPN > Closing TUN/TAP interface
. 2016.06.10 16:25:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.10 16:25:08 - Connection terminated.
I 2016.06.10 16:25:08 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.10 16:25:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.10 16:25:11 - Checking authorization ...
! 2016.06.10 16:25:11 - Connecting to Pavonis (United States, Chicago, Illinois)
. 2016.06.10 16:25:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 16:25:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 16:25:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 16:25:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 16:25:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:25:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:25:12 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 16:25:12 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 16:25:12 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443
. 2016.06.10 16:25:12 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=14b07178 c7ec08f2
. 2016.06.10 16:25:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 16:25:12 - OpenVPN > Validating certificate key usage
. 2016.06.10 16:25:12 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 16:25:12 - OpenVPN > VERIFY KU OK
. 2016.06.10 16:25:12 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 16:25:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 16:25:12 - OpenVPN > VERIFY EKU OK
. 2016.06.10 16:25:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 16:25:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 16:25:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:25:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 16:25:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 16:25:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 16:25:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443
. 2016.06.10 16:25:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 16:25:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.106 255.255.0.0'
. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 16:25:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 16:25:15 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 16:25:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 16:25:15 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.10 16:25:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.106/255.255.0.0 [sUCCEEDED]
. 2016.06.10 16:25:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.106/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.10 16:25:15 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.10 16:25:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 16:25:20 - Starting Management Interface
. 2016.06.10 16:25:20 - OpenVPN > Initialization Sequence Completed
I 2016.06.10 16:25:20 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 16:25:20 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.10 16:25:20 - Flushing DNS
I 2016.06.10 16:25:20 - Checking route
I 2016.06.10 16:25:21 - Checking DNS
! 2016.06.10 16:25:21 - Connected.
. 2016.06.10 16:25:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.10 16:25:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.10 16:53:50 - Updating systems & servers data ...
. 2016.06.10 16:53:51 - Systems & servers data update completed
. 2016.06.10 16:59:10 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.06.10 16:59:10 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.06.10 16:59:10 - OpenVPN > Exiting due to fatal error
. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 149.255.33.154 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:59:10 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 16:59:10 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 16:59:10 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 16:59:10 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
! 2016.06.10 16:59:10 - Disconnecting
. 2016.06.10 16:59:10 - Management - Send 'signal SIGTERM'
. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 16:59:10 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 16:59:10 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 16:59:10 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 16:59:10 - OpenVPN > Closing TUN/TAP interface
. 2016.06.10 16:59:10 - Connection terminated.
I 2016.06.10 16:59:10 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.10 16:59:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.10 18:19:46 - Checking authorization ...
! 2016.06.10 18:19:47 - Connecting to Gemma (Canada, Vancouver)
. 2016.06.10 18:19:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 18:19:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 18:19:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 18:19:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 18:19:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:19:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:19:47 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 18:19:47 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 18:19:47 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443
. 2016.06.10 18:19:47 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=93606905 3da55399
. 2016.06.10 18:19:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 18:19:47 - OpenVPN > Validating certificate key usage
. 2016.06.10 18:19:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 18:19:47 - OpenVPN > VERIFY KU OK
. 2016.06.10 18:19:47 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 18:19:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 18:19:47 - OpenVPN > VERIFY EKU OK
. 2016.06.10 18:19:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 18:19:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 18:19:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:19:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 18:19:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:19:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 18:19:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2016.06.10 18:19:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 18:19:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'
. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 18:19:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 18:19:56 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 18:19:56 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 18:19:56 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.06.10 18:19:56 - OpenVPN > Exiting due to fatal error
! 2016.06.10 18:19:56 - Disconnecting
. 2016.06.10 18:19:56 - Connection terminated.
I 2016.06.10 18:19:59 - Checking authorization ...
! 2016.06.10 18:20:00 - Connecting to Gemma (Canada, Vancouver)
. 2016.06.10 18:20:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.10 18:20:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.10 18:20:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.10 18:20:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.10 18:20:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:20:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:20:00 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.10 18:20:00 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.10 18:20:00 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443
. 2016.06.10 18:20:00 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=424b6d75 5cba0c26
. 2016.06.10 18:20:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 18:20:01 - OpenVPN > Validating certificate key usage
. 2016.06.10 18:20:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 18:20:01 - OpenVPN > VERIFY KU OK
. 2016.06.10 18:20:01 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 18:20:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 18:20:01 - OpenVPN > VERIFY EKU OK
. 2016.06.10 18:20:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 18:20:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 18:20:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:20:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 18:20:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 18:20:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 18:20:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2016.06.10 18:20:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.10 18:20:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'
. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.10 18:20:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.10 18:20:06 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.10 18:20:06 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.10 18:20:06 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.10 18:20:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.178/255.255.0.0 [sUCCEEDED]
. 2016.06.10 18:20:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.178/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.10 18:20:06 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.10 18:20:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.10 18:20:11 - Starting Management Interface
. 2016.06.10 18:20:11 - OpenVPN > Initialization Sequence Completed
I 2016.06.10 18:20:11 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 18:20:11 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.10 18:20:11 - Flushing DNS
I 2016.06.10 18:20:11 - Checking route
I 2016.06.10 18:20:13 - Checking DNS
! 2016.06.10 18:20:13 - Connected.
. 2016.06.10 18:20:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.10 18:20:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.10 18:20:16 - Updating systems & servers data ...
. 2016.06.10 18:20:18 - Systems & servers data update completed
. 2016.06.10 18:46:39 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10419 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.06.10 18:46:39 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10421 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.06.10 18:46:39 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10422 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.06.10 18:50:29 - Updating systems & servers data ...
. 2016.06.10 18:50:30 - Systems & servers data update completed
. 2016.06.10 19:20:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.10 19:20:04 - OpenVPN > Validating certificate key usage
. 2016.06.10 19:20:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.10 19:20:04 - OpenVPN > VERIFY KU OK
. 2016.06.10 19:20:04 - OpenVPN > Validating certificate extended key usage
. 2016.06.10 19:20:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.10 19:20:04 - OpenVPN > VERIFY EKU OK
. 2016.06.10 19:20:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.10 19:20:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 19:20:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 19:20:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.10 19:20:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.10 19:20:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.10 19:20:30 - Updating systems & servers data ...
. 2016.06.10 19:20:32 - Systems & servers data update completed
. 2016.06.10 19:50:32 - Updating systems & servers data ...
. 2016.06.10 19:50:33 - Systems & servers data update completed
. 2016.06.10 20:05:57 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.06.10 20:05:57 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.06.10 20:05:57 - OpenVPN > Exiting due to fatal error
. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.10 20:05:57 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 20:05:57 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 20:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 20:05:57 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
! 2016.06.10 20:05:57 - Disconnecting
. 2016.06.10 20:05:57 - Management - Send 'signal SIGTERM'
. 2016.06.10 20:05:57 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.06.10 20:05:57 - OpenVPN > Route deletion fallback to route.exe
. 2016.06.10 20:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.06.10 20:05:57 - OpenVPN > Closing TUN/TAP interface
. 2016.06.10 20:05:57 - Connection terminated.
I 2016.06.10 20:05:57 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.10 20:05:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.11 04:42:49 - Checking authorization ...
! 2016.06.11 04:42:50 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.06.11 04:42:50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.11 04:42:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.11 04:42:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.11 04:42:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.11 04:42:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:50 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.11 04:42:50 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.11 04:42:50 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.06.11 04:42:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=a9465468 b0459f33
. 2016.06.11 04:42:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.11 04:42:50 - OpenVPN > Validating certificate key usage
. 2016.06.11 04:42:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.11 04:42:50 - OpenVPN > VERIFY KU OK
. 2016.06.11 04:42:50 - OpenVPN > Validating certificate extended key usage
. 2016.06.11 04:42:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.11 04:42:50 - OpenVPN > VERIFY EKU OK
. 2016.06.11 04:42:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.11 04:42:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:42:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:42:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.11 04:42:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.06.11 04:42:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.11 04:42:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.30 255.255.0.0'
. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.11 04:42:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.11 04:42:53 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.11 04:42:53 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.11 04:42:53 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.06.11 04:42:53 - OpenVPN > Exiting due to fatal error
! 2016.06.11 04:42:53 - Disconnecting
. 2016.06.11 04:42:53 - Connection terminated.
I 2016.06.11 04:42:57 - Checking authorization ...
! 2016.06.11 04:42:57 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.06.11 04:42:57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.11 04:42:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.11 04:42:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.11 04:42:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.11 04:42:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:58 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.11 04:42:58 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.11 04:42:58 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.06.11 04:42:58 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=8bc1a2f9 bcdcb426
. 2016.06.11 04:42:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.11 04:42:58 - OpenVPN > Validating certificate key usage
. 2016.06.11 04:42:58 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.11 04:42:58 - OpenVPN > VERIFY KU OK
. 2016.06.11 04:42:58 - OpenVPN > Validating certificate extended key usage
. 2016.06.11 04:42:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.11 04:42:58 - OpenVPN > VERIFY EKU OK
. 2016.06.11 04:42:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.11 04:42:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:42:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:42:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:42:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.11 04:42:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.06.11 04:43:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.11 04:43:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.30 255.255.0.0'
. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.11 04:43:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.11 04:43:01 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.11 04:43:01 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.11 04:43:01 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2016.06.11 04:43:01 - OpenVPN > Exiting due to fatal error
! 2016.06.11 04:43:01 - Disconnecting
. 2016.06.11 04:43:01 - Connection terminated.
I 2016.06.11 04:43:04 - Checking authorization ...
! 2016.06.11 04:43:05 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.06.11 04:43:05 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.11 04:43:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.11 04:43:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.11 04:43:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.11 04:43:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:43:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:43:05 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.11 04:43:05 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.11 04:43:05 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.06.11 04:43:05 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=aed9fe1e 46b81624
. 2016.06.11 04:43:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.11 04:43:06 - OpenVPN > Validating certificate key usage
. 2016.06.11 04:43:06 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.11 04:43:06 - OpenVPN > VERIFY KU OK
. 2016.06.11 04:43:06 - OpenVPN > Validating certificate extended key usage
. 2016.06.11 04:43:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.11 04:43:06 - OpenVPN > VERIFY EKU OK
. 2016.06.11 04:43:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.11 04:43:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:43:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:43:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:43:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:43:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.11 04:43:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.06.11 04:43:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.11 04:43:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.30 255.255.0.0'
. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.11 04:43:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.11 04:43:09 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.11 04:43:09 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.11 04:43:09 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.11 04:43:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.30/255.255.0.0 [sUCCEEDED]
. 2016.06.11 04:43:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.30/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.11 04:43:09 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.11 04:43:12 - Updating systems & servers data ...
. 2016.06.11 04:43:13 - Systems & servers data update completed
. 2016.06.11 04:43:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1
. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:43:14 - Starting Management Interface
. 2016.06.11 04:43:14 - OpenVPN > Initialization Sequence Completed
I 2016.06.11 04:43:14 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.11 04:43:14 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.11 04:43:14 - Flushing DNS
I 2016.06.11 04:43:14 - Checking route
I 2016.06.11 04:43:15 - Checking DNS
! 2016.06.11 04:43:16 - Connected.
. 2016.06.11 04:43:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.11 04:43:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.06.11 04:45:06 - Disconnecting
. 2016.06.11 04:45:06 - Management - Send 'signal SIGTERM'
. 2016.06.11 04:45:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.11 04:45:06 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1
. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:11 - OpenVPN > Closing TUN/TAP interface
. 2016.06.11 04:45:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.11 04:45:11 - Connection terminated.
I 2016.06.11 04:45:11 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)
I 2016.06.11 04:45:11 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.11 04:45:14 - Checking authorization ...
! 2016.06.11 04:45:15 - Connecting to Pavonis (United States, Chicago, Illinois)
. 2016.06.11 04:45:15 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.11 04:45:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.11 04:45:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.11 04:45:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.11 04:45:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:45:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:45:15 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.11 04:45:15 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.11 04:45:15 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443
. 2016.06.11 04:45:15 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=2912dcfe 117adfc3
. 2016.06.11 04:45:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.11 04:45:15 - OpenVPN > Validating certificate key usage
. 2016.06.11 04:45:15 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.11 04:45:15 - OpenVPN > VERIFY KU OK
. 2016.06.11 04:45:15 - OpenVPN > Validating certificate extended key usage
. 2016.06.11 04:45:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.11 04:45:15 - OpenVPN > VERIFY EKU OK
. 2016.06.11 04:45:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.11 04:45:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:45:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:45:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.11 04:45:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.11 04:45:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.11 04:45:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443
. 2016.06.11 04:45:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.11 04:45:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.106 255.255.0.0'
. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.11 04:45:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.11 04:45:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.11 04:45:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap
. 2016.06.11 04:45:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.11 04:45:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.106/255.255.0.0 [sUCCEEDED]
. 2016.06.11 04:45:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.106/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.11 04:45:21 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}
. 2016.06.11 04:45:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.2.1
. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.11 04:45:26 - Starting Management Interface
. 2016.06.11 04:45:26 - OpenVPN > Initialization Sequence Completed
I 2016.06.11 04:45:26 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.11 04:45:26 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.11 04:45:26 - Flushing DNS
I 2016.06.11 04:45:26 - Checking route
I 2016.06.11 04:45:31 - Checking DNS
! 2016.06.11 04:45:31 - Connected.
. 2016.06.11 04:45:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.06.11 04:45:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
 

 

I still can't get this software off my computer! 

Share this post


Link to post

Hello !

 

Please use spoiler tags for your logs. As you can see, it's unbearably long . Check my signature. It's simple to do.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I 2016.06.10 13:41:56 - DNS of a network adapter forced (Edimax 802.11n PCI Card)
I 2016.06.10 13:41:56 - DNS of a network adapter forced (TAP-Windows Adapter V9)

 

The client forces the usage of Air DNS servers. If you still want to uninstall the software,

you will have to manually change the DNS settings in your adapter to "Automatic".

This was the reason you were not able to browse the internet after the client uninstall.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

Sory about posting the logs wrong.

 

zhang888: Thank you, I think I'm done with vpn's.  I'm going

to do a clean install of windows to get it back the way it

should be. And never go near another vpn.

Share this post


Link to post

Sory about posting the logs wrong.

 

zhang888: Thank you, I think I'm done with vpn's.  I'm going

to do a clean install of windows to get it back the way it

should be. And never go near another vpn.

That's a real shame. To limit yourself like so, for next to no reason. You could use Tor instead; depending on what your use-case is.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

people who know so little about basic windows functions and networking probably don't need a VPN??  I don't really feel that way with the current state of internet in the world.  But, I still wonder what the OP was using a VPN for if he/she can so easily "quit" VPNs.

Share this post


Link to post

By the way I noticed that in your OP you said you changed DNS to obtain automatically. But it seems you didn't do so for IP.

You perhaps also didn't do it on both or all adapters: both the TAP adapter and your regular one.

Anyhow, I still think it's strange to quit an entire technology. I mean, logically speaking, you should be quitting Windows, if anything. Not VPNs. Take care.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I'm going to do a clean install of windows to get it back the way it should be.

 

going to do a clean install of windows to get it back

 

do a clean install of windows

 

CLEAN INSTALL

 

You're right. Please refrain from using OpenVPN.

Or Windows.

Or computers.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Hi iditarod656,

 

i'm copy and pasting my experience and solution to this issue that i also posted in the pinned thread ' Can only connect to the internet (browser) through AirVPN ' that also deals with this same issue, because i think i've encountered the same issue as you have and it was really quite easy to fix!

I hope you don't give up on AirVPN. i have dealt with a various VPN's in the past and AirVPN is by far the most impressive. i don't think i will be looking elsewhere for any other VPN's in the future. I would like faster speeds    , but privacy is paramount for myself and this is AirVPN's strongpoint! Also do like those servers hosted in China and Ukraine

 

you just need to follow as the guide says:

 

1. disconnect eddie, remove all network locks etc
2. go to the network change adapter settings, and reset the ipv4 DNS to 'automatic'

3. go to windows firewall, reset default settings

4. reconnect eddie , apply windows firewall network lock, connect, disconnect, etc,  and see that the issue is now fixed!

5. and remember to always shut eddie down correctly by disconnecting, removing network locks, and exiting the program.

 

 

I was worried at first too but it only took me about 10-15 minutes on how to work it out.

 

 

 

 

 

 

 

 

Copy and pasted reply from my other thread in the hopes that anyone who encounters the same problem will find my experience and solution and hopefully be able to fix it too!

 

Hi guys,

Just chiming in here to explain what fixed this for me.

So what caused the issue is i didnt close eddie properly and computer had to be reset while un-installing new software.

 

when i restarted windows, i was getting the standard "network lock activated" response, whereby no internet traffic works at all.

 

Connecting and re-connecting the VPN, reapplying and removing the network lock, reseting, etc, had no effect. also changing the network lock protocal in preferences from 'windows firewall'to 'automatic', and then re-connecting, disconnecting, resetting, etc, all had no effect.

 

so i stumbled onto this guide.

First attempt i did the reset DNS settings thing in control panel, and reset ipv4 DNS from a pre-selected server to "automatic".

 

no effect, same issue.

I then went into windwos firewall settings and restored the defaults, and then re-opened eddie and applied the network lock and its now working again.

 

i re-checked the DNS settings, and AirVPN has re-applied the correct ipv4 settings that i previously changed to automatic.

I also re-checked my windows firewall settings and they appear to be set correctly, but is there a way i can check this?

 

Obviously the network lock feature is important to have working correctly, so i would like to be sure that my AirVPN firewall settings have been re-applied correctly?

Is it enough to verify that when network lock is activated, that if all other connections are inactive, then it is working correctly?

To my mind i think that is correct, but would like to get some confirmation from the Guru's on here for peace of mind.




TL;DR --

1. didnt shut eddie down properly, network lock malfunctioned and was perma-locked, only able to access internet via eddie

2. followed directions in OP and went into network DNS settings, reset ipv4 DNS to 'automatic'.
3. went into windows firewall settings and restored defaults.
4. reconnected to eddie, re-applied network lock (re-applies DNS and firewall settings), and am back to normal now.

Share this post


Link to post

I'm going to do a clean install of windows to get it back the way it should be.

 

going to do a clean install of windows to get it back

 

do a clean install of windows

 

CLEAN INSTALL

 

You're right. Please refrain from using OpenVPN.

Or Windows.

Or computers.

 

Wow that is really condescending.  I've been using Windows since the first version.

Here's a question: Why doesn't the software have a "help" tab? How about a manual?

This somewhat experienced Windows user is accustomed to that.

 

Or are we supposed to experiment by getting letters from our ISP, then

come to the forum to figure out what happened?

Share this post


Link to post

Hi Quindecim,

 

Thank you but Honestly, imo the software itself needs to handle this.

Since it does not, it is not foolproof, and therefore is meant for people

who don't mind getting warning letters from their ISP, and don't

mind software that mucks up their computer when uninstalled.

 

The software needs to handle completely uninstalling itself

when the user wants it uninstalled, in a manner that leaves

the computer functional!

 

As a somewhat experienced Windows user, I have come to expect this.

Share this post


Link to post

Well if you go to the top left corner, you'll find the About tab, which in turn holds links to both the Eddie software and "manual" online. This is in addition to all the help regular users like ourselves can offer via posts, guides written by some of said users and staff, as well as a dedicated contact form to ask AirVPN support staff directly. This, coupled with the innate "help" the client provides in the form of the "logs" tab, makes for quite a bit of different kinds of help, to be honest. I understand that it's annoying when stuff doesn't work; it really does get on your nerves. Yet at the same time, this is also one of the more technical VPNs and while that level of technicality can be an obstruction at times, it is also the very thing which makes this service so worth it to begin with. It's not always possible to make software do everything you want, because users have different configurations - but updates are always underway as well. Eddie already takes care of a huge amount of things which are otherwise quite complicated; especially for the unitiated. But even if Eddie took care of everything, you still need to have the right sort of mindset; which at present, I don't think you currently have, respectfully.

 

You getting a letter from your ISP is very unfortunate. But you've also got to realize that even with the best of software, you yourself need to take sufficient responsibility for your setup working as intended. AirVPN would never claim the software to be foolproof, because honestly, if the person operating the software is a fool, then the software won't matter anyway. You're always welcome to post on the forums, provided you do so in a respectful, orderly and constructive way. Then it should go without saying that the community will help you out as much as possible; as evident by many of the replies you've received in this thread and the other one you made. In the end, Eddie appears to work for the vast majority of both Windows users and users of other operating systems. So if anything, the problem is perhaps more unique to you. I encourage you to keep using it however, since VPNs and related technologies are becoming more and more necessary in order to have a shred of privacy and security online. Perhaps the latest suggestions by quindecim will work for you, perhaps not. There's only one way to find out.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Here's a question: Why doesn't the software have a "help" tab? How about a manual?

This somewhat experienced Windows user is accustomed to that.

 

Or are we supposed to experiment by getting letters from our ISP, then

come to the forum to figure out what happened?

 

Both of your claims simply suggest that you did not read the FAQ page.

Specifically, this:

https://airvpn.org/faq/software_lock/

 

The uninstall feature works perfectly, both from the client directory and from the

Windows Programs menu in the control panel.

That applies to you in case you used the installer and not the portable package.

 

The software needs to handle completely uninstalling itself

when the user wants it uninstalled, in a manner that leaves

the computer functional!

 

Just a note to all readers that AirVPN client does not break your Windows settings whatsoever,

that is a blatant misinformation attempt.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

 

Here's a question: Why doesn't the software have a "help" tab? How about a manual?

This somewhat experienced Windows user is accustomed to that.

 

Or are we supposed to experiment by getting letters from our ISP, then

come to the forum to figure out what happened?

 

Both of your claims simply suggest that you did not read the FAQ page.

Specifically, this:

https://airvpn.org/faq/software_lock/

 

The uninstall feature works perfectly, both from the client directory and from the

Windows Programs menu in the control panel.

That applies to you in case you used the installer and not the portable package.

 

>The software needs to handle completely uninstalling itself

when the user wants it uninstalled, in a manner that leaves

the computer functional!

 

Just a note to all readers that AirVPN client does not break your Windows settings whatsoever,

that is a blatant misinformation attempt.

 

 

 

nah..  misinformation implies that he knows the truth.  he doesn't.  it's just an uninformed opinion. 

 

Eddie certainly does need some changes to code so that the improper shutdowns are minimized.  Or would this result in some kind of security problem?

Share this post


Link to post

They're working on those changes, since they're aware of the problem. The next version of Eddie is currently in Alpha.

However as the support staff have told me and which I certainly think is applicable to other parts of life too: "One must always kill with grace", referring to killing the program.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Wow that is really condescending

 

I know, I should have written a /s.

 

Why doesn't the software have a "help" tab? How about a manual?

This somewhat experienced Windows user is accustomed to that.

 

Really? I use Windows and I'm forced to look on the internet for manuals and documentations.. definitely a lot easier with Linux using man.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Keep in mind, if your issue is that the network lock was malfunctioning and you were only able to access the internet through Eddie, thats actually further ensuring your security. just saying.

But it is easily fixed! as i said, just reset the DNS to automatic, reset default firewall settings, and then re-connect eddie which then goes through its process to re-apply everything and set up all your firewall rules properly.

In regards to what you're saying, that eddie needs to uninstall itself in a way that doesnt continue to effect the PC's performance-- sure, i think thats valid feedback. But im pretty sure the program does un-install itself properly on its own.

But even if it doesnt un-install correctly and you have the network lock connection issue, just do as above, with the DNS and reset firewall and you should be good to go.

 

I know you are probably frustrated but it actually is a pretty comprehensive program.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...