iditarod656 0 Posted ... I already tried this:___________________________________- Go to Control Panel- Click Network and Internet- Click Network and Sharing Center- Click Change adapter settings- Right click your network- Click Properties- Click Internet Protocol Version 4 (TCP/IPv4)- Click Properties- Select Obtain DNS server address automatically.- Click OK- Click Close___________________________________ and it's still a problem. If I completely uninstall airvpn, I can't get a connection. Do I need to try revo uninstaller? Quote Share this post Link to post
zhang888 1066 Posted ... Did you enable Network Lock? Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
zhang888 1066 Posted ... Please post your logs from the client, during connection and disconnection. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
iditarod656 0 Posted ... What is "ping 8.8.8.8"? Seems to me that pinging 8.8.8.8, whatever that is, is not very user friendly. Here are some logs:. 2016.06.10 08:07:16 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 08:07:16 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2016.06.10 08:07:16 - OpenVPN > Exiting due to fatal error! 2016.06.10 08:07:16 - Disconnecting. 2016.06.10 08:07:16 - Connection terminated.I 2016.06.10 08:07:19 - Checking authorization ...! 2016.06.10 08:07:20 - Connecting to Cetus (Canada, Vancouver). 2016.06.10 08:07:20 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 08:07:20 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 08:07:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 08:07:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 08:07:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:07:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:07:20 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 08:07:20 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 08:07:20 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.249.195:443. 2016.06.10 08:07:20 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.249.195:443, sid=a228708e 2ab14ca5. 2016.06.10 08:07:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 08:07:20 - OpenVPN > Validating certificate key usage. 2016.06.10 08:07:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 08:07:20 - OpenVPN > VERIFY KU OK. 2016.06.10 08:07:20 - OpenVPN > Validating certificate extended key usage. 2016.06.10 08:07:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 08:07:20 - OpenVPN > VERIFY EKU OK. 2016.06.10 08:07:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 08:07:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 08:07:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:07:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 08:07:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:07:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 08:07:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.249.195:443. 2016.06.10 08:07:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 08:07:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.25.162 255.255.0.0'. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 08:07:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 08:07:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 08:07:23 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 08:07:23 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 08:07:23 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.10 08:07:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.25.162/255.255.0.0 [sUCCEEDED]. 2016.06.10 08:07:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.25.162/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.10 08:07:23 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.10 08:07:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.249.195 MASK 255.255.255.255 192.168.2.1. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:07:28 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 08:07:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 08:07:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:07:28 - Starting Management Interface. 2016.06.10 08:07:28 - OpenVPN > Initialization Sequence CompletedI 2016.06.10 08:07:28 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 08:07:28 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.10 08:07:28 - Flushing DNSI 2016.06.10 08:07:28 - Checking routeI 2016.06.10 08:07:28 - Checking DNS! 2016.06.10 08:07:29 - Connected.. 2016.06.10 08:07:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.10 08:07:29 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.06.10 08:19:02 - Disconnecting. 2016.06.10 08:19:02 - Management - Send 'signal SIGTERM'. 2016.06.10 08:19:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.06.10 08:19:02 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.249.195 MASK 255.255.255.255 192.168.2.1. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 08:19:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 08:19:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 08:19:07 - OpenVPN > Closing TUN/TAP interface. 2016.06.10 08:19:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.06.10 08:19:07 - Connection terminated.I 2016.06.10 08:19:07 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.10 08:19:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.10 08:19:10 - Checking authorization ...! 2016.06.10 08:19:11 - Connecting to Alkaid (United States, Chicago, Illinois). 2016.06.10 08:19:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 08:19:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 08:19:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 08:19:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 08:19:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:19:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:19:11 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 08:19:11 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 08:19:11 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443. 2016.06.10 08:19:11 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=770e7584 ddd1def7. 2016.06.10 08:19:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 08:19:11 - OpenVPN > Validating certificate key usage. 2016.06.10 08:19:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 08:19:11 - OpenVPN > VERIFY KU OK. 2016.06.10 08:19:11 - OpenVPN > Validating certificate extended key usage. 2016.06.10 08:19:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 08:19:11 - OpenVPN > VERIFY EKU OK. 2016.06.10 08:19:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 08:19:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 08:19:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:19:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 08:19:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 08:19:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 08:19:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443. 2016.06.10 08:19:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 08:19:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.235 255.255.0.0'. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 08:19:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 08:19:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 08:19:14 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 08:19:14 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 08:19:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.10 08:19:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.235/255.255.0.0 [sUCCEEDED]. 2016.06.10 08:19:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.235/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.10 08:19:14 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.10 08:19:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.154.82 MASK 255.255.255.255 192.168.2.1. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:19:19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 08:19:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 08:19:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 08:19:19 - Starting Management Interface. 2016.06.10 08:19:19 - OpenVPN > Initialization Sequence CompletedI 2016.06.10 08:19:19 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 08:19:19 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.10 08:19:19 - Flushing DNSI 2016.06.10 08:19:19 - Checking routeI 2016.06.10 08:19:20 - Checking DNS! 2016.06.10 08:19:20 - Connected.. 2016.06.10 08:19:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.10 08:19:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.06.10 08:37:31 - Updating systems & servers data .... 2016.06.10 08:37:32 - Systems & servers data update completed. 2016.06.10 09:07:32 - Updating systems & servers data .... 2016.06.10 09:07:34 - Systems & servers data update completed. 2016.06.10 09:19:12 - OpenVPN > TLS: soft reset sec=0 bytes=11459049/0 pkts=21958/0. 2016.06.10 09:19:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 09:19:12 - OpenVPN > Validating certificate key usage. 2016.06.10 09:19:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 09:19:12 - OpenVPN > VERIFY KU OK. 2016.06.10 09:19:12 - OpenVPN > Validating certificate extended key usage. 2016.06.10 09:19:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 09:19:12 - OpenVPN > VERIFY EKU OK. 2016.06.10 09:19:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 09:19:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 09:19:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 09:19:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 09:19:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 09:19:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 09:34:52 - OpenVPN > MANAGEMENT: Client disconnected. 2016.06.10 09:34:52 - OpenVPN > TUN/TAP I/O operation aborted, exiting. 2016.06.10 09:34:52 - OpenVPN > Exiting due to fatal error. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.154.82 MASK 255.255.255.255 192.168.2.1. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 09:34:52 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting! 2016.06.10 09:34:52 - Disconnecting. 2016.06.10 09:34:52 - Management - Send 'signal SIGTERM'. 2016.06.10 09:34:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 09:34:52 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 09:34:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 09:34:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 09:34:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 09:34:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 09:34:52 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 09:34:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 09:34:52 - OpenVPN > Closing TUN/TAP interface. 2016.06.10 09:34:52 - Connection terminated.I 2016.06.10 13:27:30 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.10 13:27:30 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.10 13:27:41 - Checking authorization ...! 2016.06.10 13:27:41 - Connecting to Gemma (Canada, Vancouver). 2016.06.10 13:27:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 13:27:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 13:27:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 13:27:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 13:27:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:41 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 13:27:41 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 13:27:41 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443. 2016.06.10 13:27:42 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=e0212001 c0463cfd. 2016.06.10 13:27:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 13:27:42 - OpenVPN > Validating certificate key usage. 2016.06.10 13:27:42 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 13:27:42 - OpenVPN > VERIFY KU OK. 2016.06.10 13:27:42 - OpenVPN > Validating certificate extended key usage. 2016.06.10 13:27:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 13:27:42 - OpenVPN > VERIFY EKU OK. 2016.06.10 13:27:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 13:27:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 13:27:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 13:27:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 13:27:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2016.06.10 13:27:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 13:27:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 13:27:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 13:27:47 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 13:27:47 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 13:27:47 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 13:27:47 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2016.06.10 13:27:47 - OpenVPN > Exiting due to fatal error! 2016.06.10 13:27:47 - Disconnecting. 2016.06.10 13:27:47 - Connection terminated.I 2016.06.10 13:27:50 - Checking authorization ...! 2016.06.10 13:27:51 - Connecting to Gemma (Canada, Vancouver). 2016.06.10 13:27:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 13:27:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 13:27:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 13:27:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 13:27:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:51 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 13:27:51 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 13:27:51 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443. 2016.06.10 13:27:51 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=eff770a7 8fe5b7ae. 2016.06.10 13:27:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 13:27:51 - OpenVPN > Validating certificate key usage. 2016.06.10 13:27:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 13:27:51 - OpenVPN > VERIFY KU OK. 2016.06.10 13:27:51 - OpenVPN > Validating certificate extended key usage. 2016.06.10 13:27:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 13:27:51 - OpenVPN > VERIFY EKU OK. 2016.06.10 13:27:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 13:27:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 13:27:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 13:27:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:27:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 13:27:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2016.06.10 13:27:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 13:27:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 13:27:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 13:27:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 13:27:55 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 13:27:55 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 13:27:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.10 13:27:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.178/255.255.0.0 [sUCCEEDED]. 2016.06.10 13:27:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.178/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.10 13:27:55 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.10 13:28:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.2.1. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:28:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 13:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:28:00 - Starting Management Interface. 2016.06.10 13:28:00 - OpenVPN > Initialization Sequence CompletedI 2016.06.10 13:28:00 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 13:28:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.10 13:28:00 - Flushing DNSI 2016.06.10 13:28:00 - Checking routeI 2016.06.10 13:28:01 - Checking DNS! 2016.06.10 13:28:01 - Connected.. 2016.06.10 13:28:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.10 13:28:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.06.10 13:28:12 - Updating systems & servers data .... 2016.06.10 13:28:13 - Systems & servers data update completed! 2016.06.10 13:41:39 - Disconnecting. 2016.06.10 13:41:39 - Management - Send 'signal SIGTERM'. 2016.06.10 13:41:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.06.10 13:41:39 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.2.1. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 13:41:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:41:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 13:41:44 - OpenVPN > Closing TUN/TAP interface. 2016.06.10 13:41:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.06.10 13:41:44 - Connection terminated.I 2016.06.10 13:41:44 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.10 13:41:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.10 13:41:47 - Checking authorization ...! 2016.06.10 13:41:47 - Connecting to Auva (United States, Dallas, Texas). 2016.06.10 13:41:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 13:41:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 13:41:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 13:41:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 13:41:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:41:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:41:48 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 13:41:48 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 13:41:48 - OpenVPN > UDPv4 link remote: [AF_INET]23.88.114.42:443. 2016.06.10 13:41:48 - OpenVPN > TLS: Initial packet from [AF_INET]23.88.114.42:443, sid=0b25d557 21901f6b. 2016.06.10 13:41:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 13:41:48 - OpenVPN > Validating certificate key usage. 2016.06.10 13:41:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 13:41:48 - OpenVPN > VERIFY KU OK. 2016.06.10 13:41:48 - OpenVPN > Validating certificate extended key usage. 2016.06.10 13:41:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 13:41:48 - OpenVPN > VERIFY EKU OK. 2016.06.10 13:41:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 13:41:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 13:41:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:41:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 13:41:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 13:41:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 13:41:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]23.88.114.42:443. 2016.06.10 13:41:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 13:41:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.238 255.255.0.0'. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 13:41:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 13:41:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 13:41:51 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 13:41:51 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 13:41:51 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.10 13:41:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.5.238/255.255.0.0 [sUCCEEDED]. 2016.06.10 13:41:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.5.238/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.10 13:41:51 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.10 13:41:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 23.88.114.42 MASK 255.255.255.255 192.168.2.1. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:41:56 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:41:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 13:41:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 13:41:56 - Starting Management Interface. 2016.06.10 13:41:56 - OpenVPN > Initialization Sequence CompletedI 2016.06.10 13:41:56 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 13:41:56 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.10 13:41:56 - Flushing DNSI 2016.06.10 13:41:56 - Checking routeI 2016.06.10 13:41:57 - Checking DNS! 2016.06.10 13:41:57 - Connected.. 2016.06.10 13:41:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.10 13:41:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.06.10 13:48:07 - OpenVPN > MANAGEMENT: Client disconnected. 2016.06.10 13:48:07 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting. 2016.06.10 13:48:07 - OpenVPN > TUN/TAP I/O operation aborted, exiting. 2016.06.10 13:48:07 - OpenVPN > Exiting due to fatal error. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 23.88.114.42 MASK 255.255.255.255 192.168.2.1. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:48:07 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 13:48:07 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 13:48:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 13:48:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 13:48:07 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 13:48:07 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 13:48:07 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 13:48:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 13:48:07 - OpenVPN > Closing TUN/TAP interface! 2016.06.10 13:48:07 - Disconnecting. 2016.06.10 13:48:07 - Connection terminated.I 2016.06.10 13:48:07 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.10 13:48:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9). 2016.06.10 16:23:48 - Updating systems & servers data .... 2016.06.10 16:23:50 - Systems & servers data update completedI 2016.06.10 16:23:53 - Checking authorization ...! 2016.06.10 16:23:54 - Connecting to Cynosura (Canada, Vancouver). 2016.06.10 16:23:54 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 16:23:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 16:23:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 16:23:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 16:23:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:23:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:23:54 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 16:23:54 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 16:23:54 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.21:443. 2016.06.10 16:23:54 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=85211202 6a4bfc43. 2016.06.10 16:23:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 16:23:54 - OpenVPN > Validating certificate key usage. 2016.06.10 16:23:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 16:23:54 - OpenVPN > VERIFY KU OK. 2016.06.10 16:23:54 - OpenVPN > Validating certificate extended key usage. 2016.06.10 16:23:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 16:23:54 - OpenVPN > VERIFY EKU OK. 2016.06.10 16:23:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 16:23:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 16:23:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:23:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 16:23:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:23:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 16:23:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2016.06.10 16:23:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 16:23:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.87 255.255.0.0'. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 16:23:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 16:23:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 16:23:57 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 16:23:57 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 16:23:57 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2016.06.10 16:23:57 - OpenVPN > Exiting due to fatal error! 2016.06.10 16:23:57 - Disconnecting. 2016.06.10 16:23:57 - Connection terminated.I 2016.06.10 16:24:00 - Checking authorization ...! 2016.06.10 16:24:01 - Connecting to Cynosura (Canada, Vancouver). 2016.06.10 16:24:01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 16:24:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 16:24:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 16:24:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 16:24:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:24:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:24:01 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 16:24:01 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 16:24:01 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.21:443. 2016.06.10 16:24:01 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=b7e099e8 a614124e. 2016.06.10 16:24:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 16:24:02 - OpenVPN > Validating certificate key usage. 2016.06.10 16:24:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 16:24:02 - OpenVPN > VERIFY KU OK. 2016.06.10 16:24:02 - OpenVPN > Validating certificate extended key usage. 2016.06.10 16:24:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 16:24:02 - OpenVPN > VERIFY EKU OK. 2016.06.10 16:24:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 16:24:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 16:24:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:24:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 16:24:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:24:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 16:24:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2016.06.10 16:24:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 16:24:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.87 255.255.0.0'. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 16:24:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 16:24:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 16:24:07 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 16:24:08 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 16:24:08 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.10 16:24:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.87/255.255.0.0 [sUCCEEDED]. 2016.06.10 16:24:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.87/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.10 16:24:08 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.10 16:24:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.21 MASK 255.255.255.255 192.168.2.1. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:24:12 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:24:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 16:24:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:24:12 - Starting Management Interface. 2016.06.10 16:24:12 - OpenVPN > Initialization Sequence CompletedI 2016.06.10 16:24:12 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 16:24:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.10 16:24:14 - Flushing DNSI 2016.06.10 16:24:14 - Checking routeI 2016.06.10 16:24:17 - Checking DNS! 2016.06.10 16:24:17 - Connected.. 2016.06.10 16:24:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.06.10 16:24:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2016.06.10 16:25:03 - Disconnecting. 2016.06.10 16:25:03 - Management - Send 'signal SIGTERM'. 2016.06.10 16:25:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.06.10 16:25:03 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.21 MASK 255.255.255.255 192.168.2.1. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 16:25:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:25:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 16:25:08 - OpenVPN > Closing TUN/TAP interface. 2016.06.10 16:25:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.06.10 16:25:08 - Connection terminated.I 2016.06.10 16:25:08 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.10 16:25:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.10 16:25:11 - Checking authorization ...! 2016.06.10 16:25:11 - Connecting to Pavonis (United States, Chicago, Illinois). 2016.06.10 16:25:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 16:25:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 16:25:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 16:25:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 16:25:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:25:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:25:12 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 16:25:12 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 16:25:12 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443. 2016.06.10 16:25:12 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=14b07178 c7ec08f2. 2016.06.10 16:25:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 16:25:12 - OpenVPN > Validating certificate key usage. 2016.06.10 16:25:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 16:25:12 - OpenVPN > VERIFY KU OK. 2016.06.10 16:25:12 - OpenVPN > Validating certificate extended key usage. 2016.06.10 16:25:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 16:25:12 - OpenVPN > VERIFY EKU OK. 2016.06.10 16:25:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 16:25:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 16:25:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:25:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 16:25:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 16:25:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 16:25:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443. 2016.06.10 16:25:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 16:25:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.106 255.255.0.0'. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 16:25:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 16:25:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 16:25:15 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 16:25:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 16:25:15 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.10 16:25:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.106/255.255.0.0 [sUCCEEDED]. 2016.06.10 16:25:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.106/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.10 16:25:15 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.10 16:25:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.2.1. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:25:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:25:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 16:25:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 16:25:20 - Starting Management Interface. 2016.06.10 16:25:20 - OpenVPN > Initialization Sequence CompletedI 2016.06.10 16:25:20 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 16:25:20 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.10 16:25:20 - Flushing DNSI 2016.06.10 16:25:20 - Checking routeI 2016.06.10 16:25:21 - Checking DNS! 2016.06.10 16:25:21 - Connected.. 2016.06.10 16:25:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.10 16:25:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.06.10 16:53:50 - Updating systems & servers data .... 2016.06.10 16:53:51 - Systems & servers data update completed. 2016.06.10 16:59:10 - OpenVPN > MANAGEMENT: Client disconnected. 2016.06.10 16:59:10 - OpenVPN > TUN/TAP I/O operation aborted, exiting. 2016.06.10 16:59:10 - OpenVPN > Exiting due to fatal error. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 149.255.33.154 MASK 255.255.255.255 192.168.2.1. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:59:10 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 16:59:10 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 16:59:10 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 16:59:10 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting! 2016.06.10 16:59:10 - Disconnecting. 2016.06.10 16:59:10 - Management - Send 'signal SIGTERM'. 2016.06.10 16:59:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 16:59:10 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 16:59:10 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 16:59:10 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 16:59:10 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 16:59:10 - OpenVPN > Closing TUN/TAP interface. 2016.06.10 16:59:10 - Connection terminated.I 2016.06.10 16:59:10 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.10 16:59:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.10 18:19:46 - Checking authorization ...! 2016.06.10 18:19:47 - Connecting to Gemma (Canada, Vancouver). 2016.06.10 18:19:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 18:19:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 18:19:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 18:19:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 18:19:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:19:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:19:47 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 18:19:47 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 18:19:47 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443. 2016.06.10 18:19:47 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=93606905 3da55399. 2016.06.10 18:19:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 18:19:47 - OpenVPN > Validating certificate key usage. 2016.06.10 18:19:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 18:19:47 - OpenVPN > VERIFY KU OK. 2016.06.10 18:19:47 - OpenVPN > Validating certificate extended key usage. 2016.06.10 18:19:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 18:19:47 - OpenVPN > VERIFY EKU OK. 2016.06.10 18:19:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 18:19:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 18:19:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:19:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 18:19:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:19:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 18:19:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2016.06.10 18:19:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 18:19:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 18:19:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 18:19:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 18:19:56 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 18:19:56 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 18:19:56 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2016.06.10 18:19:56 - OpenVPN > Exiting due to fatal error! 2016.06.10 18:19:56 - Disconnecting. 2016.06.10 18:19:56 - Connection terminated.I 2016.06.10 18:19:59 - Checking authorization ...! 2016.06.10 18:20:00 - Connecting to Gemma (Canada, Vancouver). 2016.06.10 18:20:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.10 18:20:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.10 18:20:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.10 18:20:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.10 18:20:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:20:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:20:00 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.10 18:20:00 - OpenVPN > UDPv4 link local: [undef]. 2016.06.10 18:20:00 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443. 2016.06.10 18:20:00 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=424b6d75 5cba0c26. 2016.06.10 18:20:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 18:20:01 - OpenVPN > Validating certificate key usage. 2016.06.10 18:20:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 18:20:01 - OpenVPN > VERIFY KU OK. 2016.06.10 18:20:01 - OpenVPN > Validating certificate extended key usage. 2016.06.10 18:20:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 18:20:01 - OpenVPN > VERIFY EKU OK. 2016.06.10 18:20:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 18:20:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 18:20:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:20:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 18:20:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 18:20:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 18:20:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2016.06.10 18:20:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.10 18:20:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.178 255.255.0.0'. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.10 18:20:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.10 18:20:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.10 18:20:06 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.10 18:20:06 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.10 18:20:06 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.10 18:20:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.178/255.255.0.0 [sUCCEEDED]. 2016.06.10 18:20:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.178/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.10 18:20:06 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.10 18:20:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.2.1. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 18:20:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 18:20:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.10 18:20:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.10 18:20:11 - Starting Management Interface. 2016.06.10 18:20:11 - OpenVPN > Initialization Sequence CompletedI 2016.06.10 18:20:11 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 18:20:11 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.10 18:20:11 - Flushing DNSI 2016.06.10 18:20:11 - Checking routeI 2016.06.10 18:20:13 - Checking DNS! 2016.06.10 18:20:13 - Connected.. 2016.06.10 18:20:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.10 18:20:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.06.10 18:20:16 - Updating systems & servers data .... 2016.06.10 18:20:18 - Systems & servers data update completed. 2016.06.10 18:46:39 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10419 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.06.10 18:46:39 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10421 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.06.10 18:46:39 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10422 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.06.10 18:50:29 - Updating systems & servers data .... 2016.06.10 18:50:30 - Systems & servers data update completed. 2016.06.10 19:20:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.10 19:20:04 - OpenVPN > Validating certificate key usage. 2016.06.10 19:20:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.10 19:20:04 - OpenVPN > VERIFY KU OK. 2016.06.10 19:20:04 - OpenVPN > Validating certificate extended key usage. 2016.06.10 19:20:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.10 19:20:04 - OpenVPN > VERIFY EKU OK. 2016.06.10 19:20:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.10 19:20:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 19:20:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 19:20:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.10 19:20:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.10 19:20:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.10 19:20:30 - Updating systems & servers data .... 2016.06.10 19:20:32 - Systems & servers data update completed. 2016.06.10 19:50:32 - Updating systems & servers data .... 2016.06.10 19:50:33 - Systems & servers data update completed. 2016.06.10 20:05:57 - OpenVPN > MANAGEMENT: Client disconnected. 2016.06.10 20:05:57 - OpenVPN > TUN/TAP I/O operation aborted, exiting. 2016.06.10 20:05:57 - OpenVPN > Exiting due to fatal error. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.2.1. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.10 20:05:57 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 20:05:57 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 20:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 20:05:57 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting. 2016.06.10 20:05:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1! 2016.06.10 20:05:57 - Disconnecting. 2016.06.10 20:05:57 - Management - Send 'signal SIGTERM'. 2016.06.10 20:05:57 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2016.06.10 20:05:57 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2016.06.10 20:05:57 - OpenVPN > Route deletion fallback to route.exe. 2016.06.10 20:05:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.06.10 20:05:57 - OpenVPN > Closing TUN/TAP interface. 2016.06.10 20:05:57 - Connection terminated.I 2016.06.10 20:05:57 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.10 20:05:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.11 04:42:49 - Checking authorization ...! 2016.06.11 04:42:50 - Connecting to Avior (Canada, Toronto, Ontario). 2016.06.11 04:42:50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.11 04:42:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.11 04:42:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.11 04:42:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.11 04:42:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:50 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.11 04:42:50 - OpenVPN > UDPv4 link local: [undef]. 2016.06.11 04:42:50 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.06.11 04:42:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=a9465468 b0459f33. 2016.06.11 04:42:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.11 04:42:50 - OpenVPN > Validating certificate key usage. 2016.06.11 04:42:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.11 04:42:50 - OpenVPN > VERIFY KU OK. 2016.06.11 04:42:50 - OpenVPN > Validating certificate extended key usage. 2016.06.11 04:42:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.11 04:42:50 - OpenVPN > VERIFY EKU OK. 2016.06.11 04:42:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.11 04:42:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:42:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:42:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.11 04:42:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.06.11 04:42:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.11 04:42:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.30 255.255.0.0'. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.11 04:42:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.11 04:42:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.11 04:42:53 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.11 04:42:53 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.11 04:42:53 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2016.06.11 04:42:53 - OpenVPN > Exiting due to fatal error! 2016.06.11 04:42:53 - Disconnecting. 2016.06.11 04:42:53 - Connection terminated.I 2016.06.11 04:42:57 - Checking authorization ...! 2016.06.11 04:42:57 - Connecting to Avior (Canada, Toronto, Ontario). 2016.06.11 04:42:57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.11 04:42:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.11 04:42:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.11 04:42:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.11 04:42:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:58 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.11 04:42:58 - OpenVPN > UDPv4 link local: [undef]. 2016.06.11 04:42:58 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.06.11 04:42:58 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=8bc1a2f9 bcdcb426. 2016.06.11 04:42:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.11 04:42:58 - OpenVPN > Validating certificate key usage. 2016.06.11 04:42:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.11 04:42:58 - OpenVPN > VERIFY KU OK. 2016.06.11 04:42:58 - OpenVPN > Validating certificate extended key usage. 2016.06.11 04:42:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.11 04:42:58 - OpenVPN > VERIFY EKU OK. 2016.06.11 04:42:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.11 04:42:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:42:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:42:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:42:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.11 04:42:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.06.11 04:43:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.11 04:43:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.30 255.255.0.0'. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.11 04:43:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.11 04:43:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.11 04:43:01 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.11 04:43:01 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.11 04:43:01 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2016.06.11 04:43:01 - OpenVPN > Exiting due to fatal error! 2016.06.11 04:43:01 - Disconnecting. 2016.06.11 04:43:01 - Connection terminated.I 2016.06.11 04:43:04 - Checking authorization ...! 2016.06.11 04:43:05 - Connecting to Avior (Canada, Toronto, Ontario). 2016.06.11 04:43:05 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.11 04:43:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.11 04:43:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.11 04:43:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.11 04:43:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:43:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:43:05 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.11 04:43:05 - OpenVPN > UDPv4 link local: [undef]. 2016.06.11 04:43:05 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.06.11 04:43:05 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=aed9fe1e 46b81624. 2016.06.11 04:43:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.11 04:43:06 - OpenVPN > Validating certificate key usage. 2016.06.11 04:43:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.11 04:43:06 - OpenVPN > VERIFY KU OK. 2016.06.11 04:43:06 - OpenVPN > Validating certificate extended key usage. 2016.06.11 04:43:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.11 04:43:06 - OpenVPN > VERIFY EKU OK. 2016.06.11 04:43:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.11 04:43:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:43:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:43:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:43:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:43:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.11 04:43:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.06.11 04:43:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.11 04:43:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.30 255.255.0.0'. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.11 04:43:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.11 04:43:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.11 04:43:09 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.11 04:43:09 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.11 04:43:09 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.11 04:43:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.30/255.255.0.0 [sUCCEEDED]. 2016.06.11 04:43:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.30/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.11 04:43:09 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.11 04:43:12 - Updating systems & servers data .... 2016.06.11 04:43:13 - Systems & servers data update completed. 2016.06.11 04:43:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:43:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.11 04:43:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.11 04:43:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:43:14 - Starting Management Interface. 2016.06.11 04:43:14 - OpenVPN > Initialization Sequence CompletedI 2016.06.11 04:43:14 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.11 04:43:14 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.11 04:43:14 - Flushing DNSI 2016.06.11 04:43:14 - Checking routeI 2016.06.11 04:43:15 - Checking DNS! 2016.06.11 04:43:16 - Connected.. 2016.06.11 04:43:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.11 04:43:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.06.11 04:45:06 - Disconnecting. 2016.06.11 04:45:06 - Management - Send 'signal SIGTERM'. 2016.06.11 04:45:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.06.11 04:45:06 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.11 04:45:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.11 04:45:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.11 04:45:11 - OpenVPN > Closing TUN/TAP interface. 2016.06.11 04:45:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.06.11 04:45:11 - Connection terminated.I 2016.06.11 04:45:11 - DNS of a network adapter restored to original settings (Edimax 802.11n PCI Card)I 2016.06.11 04:45:11 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.11 04:45:14 - Checking authorization ...! 2016.06.11 04:45:15 - Connecting to Pavonis (United States, Chicago, Illinois). 2016.06.11 04:45:15 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.11 04:45:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.11 04:45:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.11 04:45:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.11 04:45:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:45:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:45:15 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2016.06.11 04:45:15 - OpenVPN > UDPv4 link local: [undef]. 2016.06.11 04:45:15 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443. 2016.06.11 04:45:15 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=2912dcfe 117adfc3. 2016.06.11 04:45:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.11 04:45:15 - OpenVPN > Validating certificate key usage. 2016.06.11 04:45:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.11 04:45:15 - OpenVPN > VERIFY KU OK. 2016.06.11 04:45:15 - OpenVPN > Validating certificate extended key usage. 2016.06.11 04:45:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.11 04:45:15 - OpenVPN > VERIFY EKU OK. 2016.06.11 04:45:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.11 04:45:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:45:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:45:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.11 04:45:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.11 04:45:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.11 04:45:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443. 2016.06.11 04:45:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.11 04:45:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.106 255.255.0.0'. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.11 04:45:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.11 04:45:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.11 04:45:21 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.11 04:45:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{824F3864-5163-494D-8069-80910B96BB2B}.tap. 2016.06.11 04:45:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.11 04:45:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.106/255.255.0.0 [sUCCEEDED]. 2016.06.11 04:45:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.106/255.255.0.0 on interface {824F3864-5163-494D-8069-80910B96BB2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.06.11 04:45:21 - OpenVPN > Successful ARP Flush on interface [16] {824F3864-5163-494D-8069-80910B96BB2B}. 2016.06.11 04:45:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.2.1. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:45:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.06.11 04:45:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.11 04:45:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.11 04:45:26 - Starting Management Interface. 2016.06.11 04:45:26 - OpenVPN > Initialization Sequence CompletedI 2016.06.11 04:45:26 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.11 04:45:26 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.11 04:45:26 - Flushing DNSI 2016.06.11 04:45:26 - Checking routeI 2016.06.11 04:45:31 - Checking DNS! 2016.06.11 04:45:31 - Connected.. 2016.06.11 04:45:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.11 04:45:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info I still can't get this software off my computer! Quote Share this post Link to post
LZ1 673 Posted ... Hello ! Please use spoiler tags for your logs. As you can see, it's unbearably long . Check my signature. It's simple to do. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
zhang888 1066 Posted ... I 2016.06.10 13:41:56 - DNS of a network adapter forced (Edimax 802.11n PCI Card)I 2016.06.10 13:41:56 - DNS of a network adapter forced (TAP-Windows Adapter V9) The client forces the usage of Air DNS servers. If you still want to uninstall the software,you will have to manually change the DNS settings in your adapter to "Automatic".This was the reason you were not able to browse the internet after the client uninstall. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
iditarod656 0 Posted ... Sory about posting the logs wrong. zhang888: Thank you, I think I'm done with vpn's. I'm goingto do a clean install of windows to get it back the way itshould be. And never go near another vpn. Quote Share this post Link to post
LZ1 673 Posted ... Sory about posting the logs wrong. zhang888: Thank you, I think I'm done with vpn's. I'm goingto do a clean install of windows to get it back the way itshould be. And never go near another vpn.That's a real shame. To limit yourself like so, for next to no reason. You could use Tor instead; depending on what your use-case is. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
go558a83nk 364 Posted ... people who know so little about basic windows functions and networking probably don't need a VPN?? I don't really feel that way with the current state of internet in the world. But, I still wonder what the OP was using a VPN for if he/she can so easily "quit" VPNs. Quote Share this post Link to post
LZ1 673 Posted ... By the way I noticed that in your OP you said you changed DNS to obtain automatically. But it seems you didn't do so for IP.You perhaps also didn't do it on both or all adapters: both the TAP adapter and your regular one.Anyhow, I still think it's strange to quit an entire technology. I mean, logically speaking, you should be quitting Windows, if anything. Not VPNs. Take care. 1 BigHead50 reacted to this Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
OpenSourcerer 1441 Posted ... I'm going to do a clean install of windows to get it back the way it should be. going to do a clean install of windows to get it back do a clean install of windows CLEAN INSTALL You're right. Please refrain from using OpenVPN.Or Windows.Or computers. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
quindecim 3 Posted ... Hi iditarod656, i'm copy and pasting my experience and solution to this issue that i also posted in the pinned thread ' Can only connect to the internet (browser) through AirVPN ' that also deals with this same issue, because i think i've encountered the same issue as you have and it was really quite easy to fix!I hope you don't give up on AirVPN. i have dealt with a various VPN's in the past and AirVPN is by far the most impressive. i don't think i will be looking elsewhere for any other VPN's in the future. I would like faster speeds , but privacy is paramount for myself and this is AirVPN's strongpoint! Also do like those servers hosted in China and Ukraine you just need to follow as the guide says: 1. disconnect eddie, remove all network locks etc2. go to the network change adapter settings, and reset the ipv4 DNS to 'automatic'3. go to windows firewall, reset default settings4. reconnect eddie , apply windows firewall network lock, connect, disconnect, etc, and see that the issue is now fixed!5. and remember to always shut eddie down correctly by disconnecting, removing network locks, and exiting the program. I was worried at first too but it only took me about 10-15 minutes on how to work it out. Copy and pasted reply from my other thread in the hopes that anyone who encounters the same problem will find my experience and solution and hopefully be able to fix it too! Hi guys,Just chiming in here to explain what fixed this for me.So what caused the issue is i didnt close eddie properly and computer had to be reset while un-installing new software. when i restarted windows, i was getting the standard "network lock activated" response, whereby no internet traffic works at all. Connecting and re-connecting the VPN, reapplying and removing the network lock, reseting, etc, had no effect. also changing the network lock protocal in preferences from 'windows firewall'to 'automatic', and then re-connecting, disconnecting, resetting, etc, all had no effect. so i stumbled onto this guide.First attempt i did the reset DNS settings thing in control panel, and reset ipv4 DNS from a pre-selected server to "automatic". no effect, same issue.I then went into windwos firewall settings and restored the defaults, and then re-opened eddie and applied the network lock and its now working again. i re-checked the DNS settings, and AirVPN has re-applied the correct ipv4 settings that i previously changed to automatic.I also re-checked my windows firewall settings and they appear to be set correctly, but is there a way i can check this? Obviously the network lock feature is important to have working correctly, so i would like to be sure that my AirVPN firewall settings have been re-applied correctly?Is it enough to verify that when network lock is activated, that if all other connections are inactive, then it is working correctly?To my mind i think that is correct, but would like to get some confirmation from the Guru's on here for peace of mind.TL;DR --1. didnt shut eddie down properly, network lock malfunctioned and was perma-locked, only able to access internet via eddie2. followed directions in OP and went into network DNS settings, reset ipv4 DNS to 'automatic'.3. went into windows firewall settings and restored defaults.4. reconnected to eddie, re-applied network lock (re-applies DNS and firewall settings), and am back to normal now. 1 LZ1 reacted to this Quote Share this post Link to post
iditarod656 0 Posted ... I'm going to do a clean install of windows to get it back the way it should be. going to do a clean install of windows to get it back do a clean install of windows CLEAN INSTALL You're right. Please refrain from using OpenVPN.Or Windows.Or computers. Wow that is really condescending. I've been using Windows since the first version.Here's a question: Why doesn't the software have a "help" tab? How about a manual?This somewhat experienced Windows user is accustomed to that. Or are we supposed to experiment by getting letters from our ISP, thencome to the forum to figure out what happened? Quote Share this post Link to post
iditarod656 0 Posted ... Hi Quindecim, Thank you but Honestly, imo the software itself needs to handle this.Since it does not, it is not foolproof, and therefore is meant for peoplewho don't mind getting warning letters from their ISP, and don'tmind software that mucks up their computer when uninstalled. The software needs to handle completely uninstalling itselfwhen the user wants it uninstalled, in a manner that leavesthe computer functional! As a somewhat experienced Windows user, I have come to expect this. Quote Share this post Link to post
LZ1 673 Posted ... Well if you go to the top left corner, you'll find the About tab, which in turn holds links to both the Eddie software and "manual" online. This is in addition to all the help regular users like ourselves can offer via posts, guides written by some of said users and staff, as well as a dedicated contact form to ask AirVPN support staff directly. This, coupled with the innate "help" the client provides in the form of the "logs" tab, makes for quite a bit of different kinds of help, to be honest. I understand that it's annoying when stuff doesn't work; it really does get on your nerves. Yet at the same time, this is also one of the more technical VPNs and while that level of technicality can be an obstruction at times, it is also the very thing which makes this service so worth it to begin with. It's not always possible to make software do everything you want, because users have different configurations - but updates are always underway as well. Eddie already takes care of a huge amount of things which are otherwise quite complicated; especially for the unitiated. But even if Eddie took care of everything, you still need to have the right sort of mindset; which at present, I don't think you currently have, respectfully. You getting a letter from your ISP is very unfortunate. But you've also got to realize that even with the best of software, you yourself need to take sufficient responsibility for your setup working as intended. AirVPN would never claim the software to be foolproof, because honestly, if the person operating the software is a fool, then the software won't matter anyway. You're always welcome to post on the forums, provided you do so in a respectful, orderly and constructive way. Then it should go without saying that the community will help you out as much as possible; as evident by many of the replies you've received in this thread and the other one you made. In the end, Eddie appears to work for the vast majority of both Windows users and users of other operating systems. So if anything, the problem is perhaps more unique to you. I encourage you to keep using it however, since VPNs and related technologies are becoming more and more necessary in order to have a shred of privacy and security online. Perhaps the latest suggestions by quindecim will work for you, perhaps not. There's only one way to find out. 1 BigHead50 reacted to this Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
zhang888 1066 Posted ... Here's a question: Why doesn't the software have a "help" tab? How about a manual?This somewhat experienced Windows user is accustomed to that. Or are we supposed to experiment by getting letters from our ISP, thencome to the forum to figure out what happened? Both of your claims simply suggest that you did not read the FAQ page.Specifically, this:https://airvpn.org/faq/software_lock/ The uninstall feature works perfectly, both from the client directory and from theWindows Programs menu in the control panel.That applies to you in case you used the installer and not the portable package. The software needs to handle completely uninstalling itselfwhen the user wants it uninstalled, in a manner that leavesthe computer functional! Just a note to all readers that AirVPN client does not break your Windows settings whatsoever,that is a blatant misinformation attempt. 1 BigHead50 reacted to this Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
go558a83nk 364 Posted ... Here's a question: Why doesn't the software have a "help" tab? How about a manual?This somewhat experienced Windows user is accustomed to that. Or are we supposed to experiment by getting letters from our ISP, thencome to the forum to figure out what happened? Both of your claims simply suggest that you did not read the FAQ page.Specifically, this:https://airvpn.org/faq/software_lock/ The uninstall feature works perfectly, both from the client directory and from theWindows Programs menu in the control panel.That applies to you in case you used the installer and not the portable package. >The software needs to handle completely uninstalling itselfwhen the user wants it uninstalled, in a manner that leavesthe computer functional! Just a note to all readers that AirVPN client does not break your Windows settings whatsoever,that is a blatant misinformation attempt. nah.. misinformation implies that he knows the truth. he doesn't. it's just an uninformed opinion. Eddie certainly does need some changes to code so that the improper shutdowns are minimized. Or would this result in some kind of security problem? Quote Share this post Link to post
LZ1 673 Posted ... They're working on those changes, since they're aware of the problem. The next version of Eddie is currently in Alpha.However as the support staff have told me and which I certainly think is applicable to other parts of life too: "One must always kill with grace", referring to killing the program. 1 BigHead50 reacted to this Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
OpenSourcerer 1441 Posted ... Wow that is really condescending I know, I should have written a /s. Why doesn't the software have a "help" tab? How about a manual?This somewhat experienced Windows user is accustomed to that. Really? I use Windows and I'm forced to look on the internet for manuals and documentations.. definitely a lot easier with Linux using man. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
quindecim 3 Posted ... Keep in mind, if your issue is that the network lock was malfunctioning and you were only able to access the internet through Eddie, thats actually further ensuring your security. just saying.But it is easily fixed! as i said, just reset the DNS to automatic, reset default firewall settings, and then re-connect eddie which then goes through its process to re-apply everything and set up all your firewall rules properly.In regards to what you're saying, that eddie needs to uninstall itself in a way that doesnt continue to effect the PC's performance-- sure, i think thats valid feedback. But im pretty sure the program does un-install itself properly on its own.But even if it doesnt un-install correctly and you have the network lock connection issue, just do as above, with the DNS and reset firewall and you should be good to go. I know you are probably frustrated but it actually is a pretty comprehensive program. Quote Share this post Link to post