Jump to content
Not connected, Your IP: 54.157.61.68
Sign in to follow this  
overlord87

Can't connect - Route/DNS Checking issues

Recommended Posts

New to AirVPN and VPN's in general. Firstly I couldn't get past the 'checking route' stage and after unchecking the 'check if tunnel effectively works' box, I can't get passed the 'Checking DNS' stage... Any help would be much appreciated!

 

Here is the log:

 

I 2016.06.24 18:36:50 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.06.24 18:36:50 - Reading options from C:\Users\Tom\AppData\Local\AirVPN\AirVPN.xml
. 2016.06.24 18:36:50 - Data Path: C:\Users\Tom\AppData\Local\AirVPN
. 2016.06.24 18:36:50 - App Path: C:\Program Files\AirVPN
. 2016.06.24 18:36:50 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.06.24 18:36:50 - Command line arguments (1): path="home"
. 2016.06.24 18:36:50 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.06.24 18:36:50 - Updating systems & servers data ...
I 2016.06.24 18:36:50 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.06.24 18:36:50 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.06.24 18:36:50 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.06.24 18:36:50 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
I 2016.06.24 18:36:50 - Session starting.
I 2016.06.24 18:36:50 - IPv6 disabled.
. 2016.06.24 18:36:50 - Systems & servers data update completed
I 2016.06.24 18:36:57 - Checking authorization ...
! 2016.06.24 18:36:57 - Connecting to Skat (Netherlands, Alblasserdam)
. 2016.06.24 18:36:57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.24 18:36:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.24 18:36:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.24 18:36:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.24 18:36:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:36:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:36:58 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.24 18:36:58 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.24 18:36:58 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.73:443
. 2016.06.24 18:36:58 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.73:443, sid=a4195d94 0471e6e8
. 2016.06.24 18:36:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.24 18:36:58 - OpenVPN > Validating certificate key usage
. 2016.06.24 18:36:58 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.24 18:36:58 - OpenVPN > VERIFY KU OK
. 2016.06.24 18:36:58 - OpenVPN > Validating certificate extended key usage
. 2016.06.24 18:36:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.24 18:36:58 - OpenVPN > VERIFY EKU OK
. 2016.06.24 18:36:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.24 18:36:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.24 18:36:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:36:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.24 18:36:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:36:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.24 18:36:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.73:443
. 2016.06.24 18:37:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.24 18:37:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.72.30 255.255.0.0'
. 2016.06.24 18:37:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.24 18:37:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.24 18:37:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.24 18:37:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.24 18:37:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.24 18:37:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.24 18:37:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.24 18:37:00 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.24 18:37:00 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{D1881364-ECDB-44CC-B7CA-886F6EFF57E5}.tap
. 2016.06.24 18:37:00 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.06.24 18:37:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.72.30/255.255.0.0 [sUCCEEDED]
. 2016.06.24 18:37:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.72.30/255.255.0.0 on interface {D1881364-ECDB-44CC-B7CA-886F6EFF57E5} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.24 18:37:00 - OpenVPN > Successful ARP Flush on interface [16] {D1881364-ECDB-44CC-B7CA-886F6EFF57E5}
. 2016.06.24 18:37:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.24 18:37:05 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.73 MASK 255.255.255.255 192.168.0.1
. 2016.06.24 18:37:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.24 18:37:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.24 18:37:05 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.06.24 18:37:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.24 18:37:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.24 18:37:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.24 18:37:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.24 18:37:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.24 18:37:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.24 18:37:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.06.24 18:37:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.24 18:37:05 - Starting Management Interface
. 2016.06.24 18:37:05 - OpenVPN > Initialization Sequence Completed
I 2016.06.24 18:37:05 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.06.24 18:37:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.24 18:37:05 - Flushing DNS
I 2016.06.24 18:37:05 - Checking DNS
W 2016.06.24 18:37:55 - The operation has timed out
! 2016.06.24 18:37:55 - Disconnecting
. 2016.06.24 18:37:55 - Management - Send 'signal SIGTERM'
. 2016.06.24 18:37:55 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.24 18:37:55 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.24 18:37:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.24 18:38:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.73 MASK 255.255.255.255 192.168.0.1
. 2016.06.24 18:38:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.24 18:38:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.06.24 18:38:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.24 18:38:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.24 18:38:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.24 18:38:00 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.24 18:38:00 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.24 18:38:00 - OpenVPN > Closing TUN/TAP interface
. 2016.06.24 18:38:00 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.24 18:38:00 - Connection terminated.
I 2016.06.24 18:38:00 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.06.24 18:38:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.24 18:38:03 - Checking authorization ...
! 2016.06.24 18:38:04 - Connecting to Skat (Netherlands, Alblasserdam)
. 2016.06.24 18:38:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.24 18:38:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.24 18:38:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.24 18:38:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.24 18:38:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:38:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:38:04 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.24 18:38:04 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.24 18:38:04 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.73:443
. 2016.06.24 18:38:04 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.73:443, sid=aad8a870 37d27bb9
. 2016.06.24 18:38:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.24 18:38:04 - OpenVPN > Validating certificate key usage
. 2016.06.24 18:38:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.24 18:38:04 - OpenVPN > VERIFY KU OK
. 2016.06.24 18:38:04 - OpenVPN > Validating certificate extended key usage
. 2016.06.24 18:38:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.24 18:38:04 - OpenVPN > VERIFY EKU OK
. 2016.06.24 18:38:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.24 18:38:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.24 18:38:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:38:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.24 18:38:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.24 18:38:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.24 18:38:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.73:443
 

 

Share this post


Link to post

Hello !

 

Welcome to AirVPN. Please post your logs in spoiler tags. Check my signature.

 

You have TAP Driver 9.21. Please try downgrading: https://airvpn.org/topic/16573-tap-driver-9210-causing-a-myriad-of-issues/


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Thanks for your response LZ1! However, after going through your recommendation it doesn't seem to have to solved the problem... 

 

Here are the logs:

 

I 2016.06.25 13:19:23 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.06.25 13:19:23 - Reading options from C:\Users\Tom\AppData\Local\AirVPN\AirVPN.xml
. 2016.06.25 13:19:23 - Data Path: C:\Users\Tom\AppData\Local\AirVPN
. 2016.06.25 13:19:23 - App Path: C:\Program Files\AirVPN
. 2016.06.25 13:19:23 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.06.25 13:19:23 - Command line arguments (1): path="home"
. 2016.06.25 13:19:23 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.06.25 13:19:23 - Updating systems & servers data ...
I 2016.06.25 13:19:23 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.1
I 2016.06.25 13:19:23 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.06.25 13:19:23 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.06.25 13:19:23 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
I 2016.06.25 13:19:23 - Session starting.
I 2016.06.25 13:19:23 - IPv6 disabled.
. 2016.06.25 13:19:23 - Systems & servers data update completed
I 2016.06.25 13:19:31 - Checking authorization ...
! 2016.06.25 13:19:31 - Connecting to Caph (Netherlands, Alblasserdam)
. 2016.06.25 13:19:31 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.25 13:19:31 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.25 13:19:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.25 13:19:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.25 13:19:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:19:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:19:31 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.25 13:19:31 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.25 13:19:31 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.169:443
. 2016.06.25 13:19:31 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.169:443, sid=aad4aac1 628d7e60
. 2016.06.25 13:19:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.25 13:19:31 - OpenVPN > Validating certificate key usage
. 2016.06.25 13:19:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.25 13:19:31 - OpenVPN > VERIFY KU OK
. 2016.06.25 13:19:31 - OpenVPN > Validating certificate extended key usage
. 2016.06.25 13:19:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.25 13:19:31 - OpenVPN > VERIFY EKU OK
. 2016.06.25 13:19:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.25 13:19:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.25 13:19:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:19:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.25 13:19:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:19:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.25 13:19:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.169:443
. 2016.06.25 13:19:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.25 13:19:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.55.209 255.255.0.0'
. 2016.06.25 13:19:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.25 13:19:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.25 13:19:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.25 13:19:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.25 13:19:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.25 13:19:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.25 13:19:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.25 13:19:34 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.25 13:19:34 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}.tap
. 2016.06.25 13:19:34 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.06.25 13:19:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.55.209/255.255.0.0 [sUCCEEDED]
. 2016.06.25 13:19:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.55.209/255.255.0.0 on interface {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.25 13:19:34 - OpenVPN > Successful ARP Flush on interface [16] {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}
. 2016.06.25 13:19:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.25 13:19:39 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.169 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:19:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.25 13:19:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:19:39 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.06.25 13:19:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.25 13:19:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:19:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:19:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.06.25 13:19:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:19:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:19:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.06.25 13:19:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:19:39 - Starting Management Interface
. 2016.06.25 13:19:39 - OpenVPN > Initialization Sequence Completed
I 2016.06.25 13:19:39 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.06.25 13:19:39 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.25 13:19:39 - Flushing DNS
I 2016.06.25 13:19:39 - Checking DNS
W 2016.06.25 13:20:29 - The operation has timed out
! 2016.06.25 13:20:29 - Disconnecting
. 2016.06.25 13:20:29 - Management - Send 'signal SIGTERM'
. 2016.06.25 13:20:29 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.25 13:20:29 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.25 13:20:29 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.25 13:20:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.169 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:20:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:20:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:20:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:20:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:34 - OpenVPN > Closing TUN/TAP interface
. 2016.06.25 13:20:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.25 13:20:34 - Connection terminated.
I 2016.06.25 13:20:34 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.06.25 13:20:34 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.25 13:20:37 - Checking authorization ...
! 2016.06.25 13:20:37 - Connecting to Caph (Netherlands, Alblasserdam)
. 2016.06.25 13:20:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.25 13:20:37 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.25 13:20:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.25 13:20:37 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.25 13:20:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:20:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:20:37 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.25 13:20:37 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.25 13:20:37 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.169:443
. 2016.06.25 13:20:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.169:443, sid=4eaf0bef a343db40
. 2016.06.25 13:20:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.25 13:20:37 - OpenVPN > Validating certificate key usage
. 2016.06.25 13:20:37 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.25 13:20:37 - OpenVPN > VERIFY KU OK
. 2016.06.25 13:20:37 - OpenVPN > Validating certificate extended key usage
. 2016.06.25 13:20:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.25 13:20:37 - OpenVPN > VERIFY EKU OK
. 2016.06.25 13:20:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.25 13:20:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.25 13:20:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:20:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.25 13:20:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:20:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.25 13:20:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.169:443
. 2016.06.25 13:20:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.25 13:20:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.55.209 255.255.0.0'
. 2016.06.25 13:20:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.25 13:20:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.25 13:20:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.25 13:20:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.25 13:20:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.25 13:20:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.25 13:20:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.25 13:20:39 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.25 13:20:39 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}.tap
. 2016.06.25 13:20:39 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.06.25 13:20:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.55.209/255.255.0.0 [sUCCEEDED]
. 2016.06.25 13:20:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.55.209/255.255.0.0 on interface {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.25 13:20:39 - OpenVPN > Successful ARP Flush on interface [16] {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}
. 2016.06.25 13:20:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.25 13:20:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.169 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:20:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.25 13:20:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:44 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.06.25 13:20:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.25 13:20:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:20:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.06.25 13:20:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:20:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.06.25 13:20:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:20:44 - Starting Management Interface
. 2016.06.25 13:20:44 - OpenVPN > Initialization Sequence Completed
I 2016.06.25 13:20:44 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.06.25 13:20:44 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.25 13:20:44 - Flushing DNS
I 2016.06.25 13:20:44 - Checking DNS
W 2016.06.25 13:21:34 - The operation has timed out
! 2016.06.25 13:21:34 - Disconnecting
. 2016.06.25 13:21:34 - Management - Send 'signal SIGTERM'
. 2016.06.25 13:21:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.25 13:21:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.25 13:21:34 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.25 13:21:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.169 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:21:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:21:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:21:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:21:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:21:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:21:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:21:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:21:39 - OpenVPN > Closing TUN/TAP interface
. 2016.06.25 13:21:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.25 13:21:39 - Connection terminated.
I 2016.06.25 13:21:39 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.06.25 13:21:39 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.06.25 13:21:39 - Cancel requested.
I 2016.06.25 13:21:39 - IPv6 restored.
! 2016.06.25 13:21:39 - Session terminated.
I 2016.06.25 13:23:20 - Session starting.
I 2016.06.25 13:23:20 - IPv6 disabled.
I 2016.06.25 13:23:20 - Checking authorization ...
! 2016.06.25 13:23:20 - Connecting to Caph (Netherlands, Alblasserdam)
. 2016.06.25 13:23:20 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.06.25 13:23:20 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.06.25 13:23:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.06.25 13:23:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.06.25 13:23:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:23:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:23:20 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.06.25 13:23:20 - OpenVPN > UDPv4 link local: [undef]
. 2016.06.25 13:23:20 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.169:443
. 2016.06.25 13:23:20 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.169:443, sid=94e610cb f4c2237d
. 2016.06.25 13:23:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.06.25 13:23:20 - OpenVPN > Validating certificate key usage
. 2016.06.25 13:23:20 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.06.25 13:23:20 - OpenVPN > VERIFY KU OK
. 2016.06.25 13:23:20 - OpenVPN > Validating certificate extended key usage
. 2016.06.25 13:23:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.06.25 13:23:20 - OpenVPN > VERIFY EKU OK
. 2016.06.25 13:23:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.06.25 13:23:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.25 13:23:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:23:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.06.25 13:23:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.06.25 13:23:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.06.25 13:23:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.169:443
. 2016.06.25 13:23:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.06.25 13:23:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.55.209 255.255.0.0'
. 2016.06.25 13:23:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.06.25 13:23:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.06.25 13:23:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.06.25 13:23:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.06.25 13:23:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.06.25 13:23:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.06.25 13:23:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.06.25 13:23:22 - OpenVPN > open_tun, tt->ipv6=0
. 2016.06.25 13:23:22 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}.tap
. 2016.06.25 13:23:22 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.06.25 13:23:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.55.209/255.255.0.0 [sUCCEEDED]
. 2016.06.25 13:23:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.55.209/255.255.0.0 on interface {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.06.25 13:23:22 - OpenVPN > Successful ARP Flush on interface [16] {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}
. 2016.06.25 13:23:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.06.25 13:23:27 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.169 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:23:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.25 13:23:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:23:27 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.06.25 13:23:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.06.25 13:23:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:23:27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:23:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.06.25 13:23:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:23:27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:23:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.06.25 13:23:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.06.25 13:23:27 - Starting Management Interface
. 2016.06.25 13:23:27 - OpenVPN > Initialization Sequence Completed
I 2016.06.25 13:23:27 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.06.25 13:23:27 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.06.25 13:23:27 - Flushing DNS
I 2016.06.25 13:23:27 - Checking DNS
W 2016.06.25 13:24:17 - The operation has timed out
! 2016.06.25 13:24:17 - Disconnecting
. 2016.06.25 13:24:17 - Management - Send 'signal SIGTERM'
. 2016.06.25 13:24:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.06.25 13:24:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.06.25 13:24:17 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.06.25 13:24:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.169 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:24:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.06.25 13:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:24:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:24:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.06.25 13:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.06.25 13:24:22 - OpenVPN > Closing TUN/TAP interface
. 2016.06.25 13:24:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.06.25 13:24:22 - Connection terminated.
I 2016.06.25 13:24:22 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.06.25 13:24:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)

Share this post


Link to post

Still can't get get it to work after trying any of the above... Almost ready to cancel the whole thing!

 

Here are the logs:

 

I 2016.07.03 12:39:26 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64

. 2016.07.03 12:39:27 - Reading options from C:\Users\Tom\AppData\Local\AirVPN\AirVPN.xml
. 2016.07.03 12:39:28 - Data Path: C:\Users\Tom\AppData\Local\AirVPN
. 2016.07.03 12:39:28 - App Path: C:\Program Files\AirVPN
. 2016.07.03 12:39:28 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.07.03 12:39:28 - Command line arguments (1): path="home"
. 2016.07.03 12:39:28 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.07.03 12:39:28 - Updating systems & servers data ...
I 2016.07.03 12:39:32 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.1
I 2016.07.03 12:39:32 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.07.03 12:39:32 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.07.03 12:39:32 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
I 2016.07.03 12:39:32 - Session starting.
I 2016.07.03 12:39:32 - IPv6 disabled.
. 2016.07.03 12:39:32 - Systems & servers data update completed
I 2016.07.03 12:39:39 - Checking authorization ...
! 2016.07.03 12:39:39 - Connecting to Asellus (Netherlands, Alblasserdam)
. 2016.07.03 12:39:39 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.03 12:39:39 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.03 12:39:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.03 12:39:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.03 12:39:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:39:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:39:39 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.03 12:39:39 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.03 12:39:39 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.19:443
. 2016.07.03 12:39:39 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=de50c4bd 886af50e
. 2016.07.03 12:39:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.03 12:39:39 - OpenVPN > Validating certificate key usage
. 2016.07.03 12:39:39 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.03 12:39:39 - OpenVPN > VERIFY KU OK
. 2016.07.03 12:39:39 - OpenVPN > Validating certificate extended key usage
. 2016.07.03 12:39:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.03 12:39:39 - OpenVPN > VERIFY EKU OK
. 2016.07.03 12:39:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.03 12:39:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:39:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:39:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:39:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:39:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.03 12:39:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.19:443
. 2016.07.03 12:39:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.03 12:39:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.89 255.255.0.0'
. 2016.07.03 12:39:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.03 12:39:42 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.03 12:39:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.03 12:39:42 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.03 12:39:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.03 12:39:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.03 12:39:42 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.03 12:39:42 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.03 12:39:42 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}.tap
. 2016.07.03 12:39:42 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.03 12:39:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.89/255.255.0.0 [sUCCEEDED]
. 2016.07.03 12:39:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.89/255.255.0.0 on interface {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.03 12:39:42 - OpenVPN > Successful ARP Flush on interface [16] {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}
. 2016.07.03 12:39:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.03 12:39:47 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:39:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:39:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:39:47 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.03 12:39:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:39:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:39:47 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:39:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:39:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:39:47 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:39:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:39:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:39:47 - Starting Management Interface
. 2016.07.03 12:39:47 - OpenVPN > Initialization Sequence Completed
I 2016.07.03 12:39:48 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:39:48 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.03 12:39:48 - Flushing DNS
I 2016.07.03 12:39:48 - Checking DNS
W 2016.07.03 12:40:38 - The operation has timed out
! 2016.07.03 12:40:39 - Disconnecting
. 2016.07.03 12:40:39 - Management - Send 'signal SIGTERM'
. 2016.07.03 12:40:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.03 12:40:39 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.03 12:40:39 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.03 12:40:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:40:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:40:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:40:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:40:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:44 - OpenVPN > Closing TUN/TAP interface
. 2016.07.03 12:40:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.03 12:40:44 - Connection terminated.
I 2016.07.03 12:40:44 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:40:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.03 12:40:47 - Checking authorization ...
! 2016.07.03 12:40:47 - Connecting to Asellus (Netherlands, Alblasserdam)
. 2016.07.03 12:40:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.03 12:40:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.03 12:40:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.03 12:40:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.03 12:40:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:40:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:40:47 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.03 12:40:47 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.03 12:40:47 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.19:443
. 2016.07.03 12:40:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=6e6ea48c 848fb8c5
. 2016.07.03 12:40:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.03 12:40:48 - OpenVPN > Validating certificate key usage
. 2016.07.03 12:40:48 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.03 12:40:48 - OpenVPN > VERIFY KU OK
. 2016.07.03 12:40:48 - OpenVPN > Validating certificate extended key usage
. 2016.07.03 12:40:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.03 12:40:48 - OpenVPN > VERIFY EKU OK
. 2016.07.03 12:40:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.03 12:40:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:40:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:40:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:40:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:40:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.03 12:40:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.19:443
. 2016.07.03 12:40:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.03 12:40:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.89 255.255.0.0'
. 2016.07.03 12:40:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.03 12:40:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.03 12:40:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.03 12:40:50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.03 12:40:50 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.03 12:40:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.03 12:40:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.03 12:40:50 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.03 12:40:50 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}.tap
. 2016.07.03 12:40:50 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.03 12:40:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.89/255.255.0.0 [sUCCEEDED]
. 2016.07.03 12:40:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.89/255.255.0.0 on interface {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.03 12:40:50 - OpenVPN > Successful ARP Flush on interface [16] {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}
. 2016.07.03 12:40:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.03 12:40:55 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:40:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:40:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.03 12:40:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:40:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:40:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:40:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:40:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:40:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:40:55 - Starting Management Interface
. 2016.07.03 12:40:55 - OpenVPN > Initialization Sequence Completed
I 2016.07.03 12:40:55 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:40:55 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.03 12:40:55 - Flushing DNS
I 2016.07.03 12:40:55 - Checking DNS
W 2016.07.03 12:41:46 - The operation has timed out
! 2016.07.03 12:41:46 - Disconnecting
. 2016.07.03 12:41:46 - Management - Send 'signal SIGTERM'
. 2016.07.03 12:41:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.03 12:41:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.03 12:41:46 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.03 12:41:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:41:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:41:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:41:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:41:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:41:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:41:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:41:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:41:52 - OpenVPN > Closing TUN/TAP interface
. 2016.07.03 12:41:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.03 12:41:52 - Connection terminated.
I 2016.07.03 12:41:52 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:41:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.03 12:41:55 - Checking authorization ...
! 2016.07.03 12:41:55 - Connecting to Asellus (Netherlands, Alblasserdam)
. 2016.07.03 12:41:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.03 12:41:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.03 12:41:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.03 12:41:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.03 12:41:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:41:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:41:55 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.03 12:41:55 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.03 12:41:55 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.19:443
. 2016.07.03 12:41:55 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=b07c8183 c86a1d76
. 2016.07.03 12:41:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.03 12:41:55 - OpenVPN > Validating certificate key usage
. 2016.07.03 12:41:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.03 12:41:55 - OpenVPN > VERIFY KU OK
. 2016.07.03 12:41:55 - OpenVPN > Validating certificate extended key usage
. 2016.07.03 12:41:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.03 12:41:55 - OpenVPN > VERIFY EKU OK
. 2016.07.03 12:41:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.03 12:41:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:41:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:41:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:41:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:41:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.03 12:41:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.19:443
. 2016.07.03 12:41:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.03 12:41:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.89 255.255.0.0'
. 2016.07.03 12:41:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.03 12:41:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.03 12:41:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.03 12:41:58 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.03 12:41:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.03 12:41:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.03 12:41:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.03 12:41:58 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.03 12:41:58 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}.tap
. 2016.07.03 12:41:58 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.03 12:41:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.89/255.255.0.0 [sUCCEEDED]
. 2016.07.03 12:41:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.89/255.255.0.0 on interface {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.03 12:41:58 - OpenVPN > Successful ARP Flush on interface [16] {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}
. 2016.07.03 12:42:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.03 12:42:03 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:42:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:42:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:03 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.03 12:42:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:42:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:03 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:42:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:42:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:03 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:42:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:42:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:03 - Starting Management Interface
. 2016.07.03 12:42:03 - OpenVPN > Initialization Sequence Completed
I 2016.07.03 12:42:03 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:42:03 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.03 12:42:03 - Flushing DNS
I 2016.07.03 12:42:03 - Checking DNS
W 2016.07.03 12:42:53 - The operation has timed out
! 2016.07.03 12:42:53 - Disconnecting
. 2016.07.03 12:42:53 - Management - Send 'signal SIGTERM'
. 2016.07.03 12:42:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.03 12:42:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.03 12:42:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.03 12:42:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:42:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:42:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:42:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:42:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:42:58 - OpenVPN > Closing TUN/TAP interface
. 2016.07.03 12:42:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.03 12:42:58 - Connection terminated.
I 2016.07.03 12:42:58 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:42:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.03 12:42:58 - Cancel requested.
I 2016.07.03 12:42:58 - IPv6 restored.
! 2016.07.03 12:42:58 - Session terminated.
I 2016.07.03 12:47:45 - Session starting.
I 2016.07.03 12:47:45 - IPv6 disabled.
I 2016.07.03 12:47:45 - Checking authorization ...
! 2016.07.03 12:47:45 - Connecting to Alterf (Netherlands, Alblasserdam)
. 2016.07.03 12:47:45 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.03 12:47:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.03 12:47:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.03 12:47:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.03 12:47:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:47:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:47:46 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.03 12:47:46 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.03 12:47:46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.169:443
. 2016.07.03 12:47:46 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.169:443, sid=e1142c32 9291e243
. 2016.07.03 12:47:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.03 12:47:46 - OpenVPN > Validating certificate key usage
. 2016.07.03 12:47:46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.03 12:47:46 - OpenVPN > VERIFY KU OK
. 2016.07.03 12:47:46 - OpenVPN > Validating certificate extended key usage
. 2016.07.03 12:47:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.03 12:47:46 - OpenVPN > VERIFY EKU OK
. 2016.07.03 12:47:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.03 12:47:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:47:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:47:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:47:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:47:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.03 12:47:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.169:443
. 2016.07.03 12:47:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.03 12:47:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.67.214 255.255.0.0'
. 2016.07.03 12:47:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.03 12:47:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.03 12:47:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.03 12:47:48 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.03 12:47:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.03 12:47:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.03 12:47:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.03 12:47:48 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.03 12:47:48 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}.tap
. 2016.07.03 12:47:48 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.03 12:47:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.67.214/255.255.0.0 [sUCCEEDED]
. 2016.07.03 12:47:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.67.214/255.255.0.0 on interface {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.03 12:47:48 - OpenVPN > Successful ARP Flush on interface [16] {B5B09C13-2F23-434F-91E7-75BE8C7AB0BC}
. 2016.07.03 12:47:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.03 12:47:53 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.169 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:47:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:47:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:47:53 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.03 12:47:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.03 12:47:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:47:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:47:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:47:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:47:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:47:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.03 12:47:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.03 12:47:53 - Starting Management Interface
. 2016.07.03 12:47:53 - OpenVPN > Initialization Sequence Completed
I 2016.07.03 12:47:53 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:47:53 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.03 12:47:53 - Flushing DNS
I 2016.07.03 12:47:53 - Checking DNS
W 2016.07.03 12:48:43 - The operation has timed out
! 2016.07.03 12:48:43 - Disconnecting
. 2016.07.03 12:48:43 - Management - Send 'signal SIGTERM'
. 2016.07.03 12:48:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.03 12:48:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.03 12:48:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.03 12:48:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.169 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:48:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:48:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.03 12:48:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:48:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:48:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:48:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.03 12:48:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.03 12:48:48 - OpenVPN > Closing TUN/TAP interface
. 2016.07.03 12:48:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.03 12:48:48 - Connection terminated.
I 2016.07.03 12:48:48 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.07.03 12:48:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.03 12:48:51 - Checking authorization ...
! 2016.07.03 12:48:51 - Connecting to Alterf (Netherlands, Alblasserdam)
. 2016.07.03 12:48:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.03 12:48:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.03 12:48:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.03 12:48:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.03 12:48:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:48:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:48:51 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.03 12:48:51 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.03 12:48:51 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.169:443
. 2016.07.03 12:48:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.169:443, sid=a87d9849 ac84aff2
. 2016.07.03 12:48:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.03 12:48:52 - OpenVPN > Validating certificate key usage
. 2016.07.03 12:48:52 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.03 12:48:52 - OpenVPN > VERIFY KU OK
. 2016.07.03 12:48:52 - OpenVPN > Validating certificate extended key usage
. 2016.07.03 12:48:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.03 12:48:52 - OpenVPN > VERIFY EKU OK
. 2016.07.03 12:48:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.03 12:48:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:48:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:48:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.03 12:48:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.03 12:48:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.03 12:48:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.169:443
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...