Jump to content
Not connected, Your IP: 3.80.5.157
The Illusive Man

Disconnecting when torrent client tuns

Recommended Posts

I'm  using kaspersky total security 2016, airpvn client 2.10.3 and TAP driver 9.0.0.21.

Whenever I start a torrent client, doesn't matter which one utorrent, tixati, qbittorent etc within 5 minutes my vpn client gets stuck in a disconnecting loop giving the message "Assertion failed at misc.c:779 "

 

 

I have already followed the steps in the link below but unfortunately that has made no difference.

 

https://airvpn.org/topic/17433-how-tofix-disconect-problems-with-kaspersky/

Here is a log file

http://s000.tinyupload.com/index.php?file_id=08295314778342552424

 

 

Any suggestions would be greatly appreciated.

 

Thanks

Share this post


Link to post

I tried your site to read your log but my anti virus claimed "harmful site".

 

Are you trying to connect to Canadian servers?

No. I always use either Netherlands or German servers

Share this post


Link to post

Hello !

 

OP I recommend just pasting your logs into some spoiler tags, for us to view them easily.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

I 2016.07.12 13:55:53 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.07.12 13:55:53 - Reading options from C:\Program Files\AirVPN\AirVPN.xml
. 2016.07.12 13:55:54 - Data Path: C:\Program Files\AirVPN
. 2016.07.12 13:55:54 - App Path: C:\Program Files\AirVPN
. 2016.07.12 13:55:54 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.07.12 13:55:54 - Command line arguments (0):
. 2016.07.12 13:55:54 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.07.12 13:55:54 - Updating systems & servers data ...
I 2016.07.12 13:55:54 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.07.12 13:55:54 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.07.12 13:55:54 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.07.12 13:55:54 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.07.12 13:55:54 - Ready
. 2016.07.12 13:55:54 - Systems & servers data update completed
I 2016.07.12 13:55:55 - Session starting.
I 2016.07.12 13:56:02 - Checking authorization ...
! 2016.07.12 13:56:02 - Connecting to Salm (Netherlands, Alblasserdam)
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[ui]: Reading configuration from file C:\Program Files\AirVPN\86e3137730c7241329ba636ebf4f1bdf335aadfb051823d676ad336177682463.tmp.ssl
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG6[ui]: Initializing service [openvpn]
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[ui]: Configuration successful
. 2016.07.12 13:56:03 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.12 13:56:03 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.12 13:56:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.12 13:56:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.12 13:56:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:56:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:56:03 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.12 13:56:03 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:5468 [nonblock]
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49170
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG6[0]: Failover strategy: round-robin
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG6[0]: s_connect: connecting 213.152.161.21:443
. 2016.07.12 13:56:03 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:5468
. 2016.07.12 13:56:03 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.12 13:56:03 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:5468
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[0]: s_connect: connected 213.152.161.21:443
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:49171
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG6[0]: SNI: sending servername: 213.152.161.21
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG6[0]: CERT: Locally installed certificate matched
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG6[0]: SSL connected: new session negotiated
. 2016.07.12 13:56:03 - SSL > 2016.07.12 13:56:03 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.07.12 13:56:03 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:5468, sid=98772e18 056d75fe
. 2016.07.12 13:56:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.12 13:56:03 - OpenVPN > Validating certificate key usage
. 2016.07.12 13:56:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.12 13:56:03 - OpenVPN > VERIFY KU OK
. 2016.07.12 13:56:03 - OpenVPN > Validating certificate extended key usage
. 2016.07.12 13:56:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.12 13:56:03 - OpenVPN > VERIFY EKU OK
. 2016.07.12 13:56:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.12 13:56:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.12 13:56:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:56:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.12 13:56:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:56:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.12 13:56:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:5468
. 2016.07.12 13:56:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.12 13:56:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.32 255.255.0.0'
. 2016.07.12 13:56:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.12 13:56:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.12 13:56:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.12 13:56:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.12 13:56:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.12 13:56:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.12 13:56:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.12 13:56:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.12 13:56:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{1592787E-EAE0-432D-98E6-A8925151588C}.tap
. 2016.07.12 13:56:05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.12 13:56:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.32/255.255.0.0 [sUCCEEDED]
. 2016.07.12 13:56:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.32/255.255.0.0 on interface {1592787E-EAE0-432D-98E6-A8925151588C} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.07.12 13:56:05 - OpenVPN > Successful ARP Flush on interface [12] {1592787E-EAE0-432D-98E6-A8925151588C}
. 2016.07.12 13:56:10 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.07.12 13:56:10 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2016.07.12 13:56:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.12 13:56:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.12 13:56:10 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 11
. 2016.07.12 13:56:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.12 13:56:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.12 13:56:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.12 13:56:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.12 13:56:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.12 13:56:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.12 13:56:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.12 13:56:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.12 13:56:10 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.21 MASK 255.255.255.255 192.168.1.254
. 2016.07.12 13:56:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.12 13:56:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.12 13:56:10 - Starting Management Interface
. 2016.07.12 13:56:10 - OpenVPN > Initialization Sequence Completed
I 2016.07.12 13:56:11 - DNS of a network adapter forced (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.12 13:56:11 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.12 13:56:11 - Flushing DNS
I 2016.07.12 13:56:11 - Checking route
I 2016.07.12 13:56:11 - Checking DNS
! 2016.07.12 13:56:11 - Connected.
. 2016.07.12 13:56:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.12 13:56:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.12 14:17:13 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.07.12 14:17:13 - SSL > 2016.07.12 14:17:13 LOG6[0]: writesocket: Socket is closed
. 2016.07.12 14:17:13 - SSL > 2016.07.12 14:17:13 LOG6[0]: SSL_shutdown successfully sent close_notify alert
. 2016.07.12 14:17:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.07.12 14:17:13 - SSL > 2016.07.12 14:17:13 LOG5[0]: Connection closed: 90879683 byte(s) sent to SSL, 897343408 byte(s) sent to socket
. 2016.07.12 14:17:13 - OpenVPN > Restart pause, 5 second(s)
! 2016.07.12 14:17:13 - Disconnecting
. 2016.07.12 14:17:13 - Management - Send 'signal SIGTERM'
. 2016.07.12 14:17:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.12 14:17:13 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.07.12 14:17:13 - OpenVPN > Assertion failed at misc.c:779
. 2016.07.12 14:17:13 - OpenVPN > Exiting due to fatal error
. 2016.07.12 14:17:13 - Connection terminated.
I 2016.07.12 14:17:13 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.12 14:17:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)

 

 

I 2016.07.12 13:27:40 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.07.12 13:27:40 - Reading options from C:\Program Files\AirVPN\AirVPN.xml
. 2016.07.12 13:27:40 - Data Path: C:\Program Files\AirVPN
. 2016.07.12 13:27:40 - App Path: C:\Program Files\AirVPN
. 2016.07.12 13:27:40 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.07.12 13:27:40 - Command line arguments (0):
. 2016.07.12 13:27:40 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.07.12 13:27:40 - Updating systems & servers data ...
I 2016.07.12 13:27:41 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.07.12 13:27:41 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.07.12 13:27:41 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.07.12 13:27:41 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
W 2016.07.12 13:27:41 - Recovery. Unexpected crash?
I 2016.07.12 13:27:41 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.12 13:27:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
! 2016.07.12 13:27:41 - Ready
. 2016.07.12 13:27:41 - Systems & servers data update completed
I 2016.07.12 13:27:43 - Session starting.
I 2016.07.12 13:27:49 - Checking authorization ...
! 2016.07.12 13:27:49 - Connecting to Salm (Netherlands, Alblasserdam)
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[ui]: Reading configuration from file C:\Program Files\AirVPN\11a6c723fb940a356d53601d675f55bde2c3c8bb70e3ace3b1b96fed78c6d224.tmp.ssl
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG6[ui]: Initializing service [openvpn]
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[ui]: Configuration successful
. 2016.07.12 13:27:50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.12 13:27:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.12 13:27:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.12 13:27:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.12 13:27:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:27:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:27:50 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.12 13:27:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:48635 [nonblock]
. 2016.07.12 13:27:50 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:48635
. 2016.07.12 13:27:50 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.12 13:27:50 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:48635
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:59774
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG6[0]: Failover strategy: round-robin
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG6[0]: s_connect: connecting 213.152.161.21:443
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[0]: s_connect: connected 213.152.161.21:443
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:59775
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG6[0]: SNI: sending servername: 213.152.161.21
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG6[0]: CERT: Locally installed certificate matched
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG6[0]: SSL connected: new session negotiated
. 2016.07.12 13:27:50 - SSL > 2016.07.12 13:27:50 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.07.12 13:27:50 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:48635, sid=44224ce3 021bc2ba
. 2016.07.12 13:27:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.12 13:27:50 - OpenVPN > Validating certificate key usage
. 2016.07.12 13:27:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.12 13:27:50 - OpenVPN > VERIFY KU OK
. 2016.07.12 13:27:50 - OpenVPN > Validating certificate extended key usage
. 2016.07.12 13:27:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.12 13:27:50 - OpenVPN > VERIFY EKU OK
. 2016.07.12 13:27:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.12 13:27:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.12 13:27:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:27:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.12 13:27:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.12 13:27:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.12 13:27:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:48635
. 2016.07.12 13:27:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.12 13:27:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.32 255.255.0.0'
. 2016.07.12 13:27:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.12 13:27:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.12 13:27:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.12 13:27:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.12 13:27:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.12 13:27:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.12 13:27:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.12 13:27:53 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.12 13:27:53 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{1592787E-EAE0-432D-98E6-A8925151588C}.tap
. 2016.07.12 13:27:53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.12 13:27:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.32/255.255.0.0 [sUCCEEDED]
. 2016.07.12 13:27:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.32/255.255.0.0 on interface {1592787E-EAE0-432D-98E6-A8925151588C} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.07.12 13:27:53 - OpenVPN > Successful ARP Flush on interface [12] {1592787E-EAE0-432D-98E6-A8925151588C}
. 2016.07.12 13:27:58 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.07.12 13:27:58 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2016.07.12 13:27:58 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=11]
. 2016.07.12 13:27:58 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.07.12 13:27:58 - OpenVPN > Route addition fallback to route.exe
. 2016.07.12 13:27:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.07.12 13:27:58 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 11
. 2016.07.12 13:27:58 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=11]
. 2016.07.12 13:27:58 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.07.12 13:27:58 - OpenVPN > Route addition fallback to route.exe
. 2016.07.12 13:27:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.07.12 13:27:58 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.12 13:27:58 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.07.12 13:27:58 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.07.12 13:27:58 - OpenVPN > Route addition fallback to route.exe
. 2016.07.12 13:27:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.07.12 13:27:58 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.12 13:27:58 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.07.12 13:27:58 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.07.12 13:27:58 - OpenVPN > Route addition fallback to route.exe
. 2016.07.12 13:27:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.07.12 13:27:58 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.21 MASK 255.255.255.255 192.168.1.254
. 2016.07.12 13:27:58 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=11]
. 2016.07.12 13:27:58 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.07.12 13:27:58 - OpenVPN > Route addition fallback to route.exe
. 2016.07.12 13:27:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.07.12 13:27:58 - Starting Management Interface
. 2016.07.12 13:27:58 - OpenVPN > Initialization Sequence Completed
I 2016.07.12 13:27:58 - DNS of a network adapter forced (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.12 13:27:58 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.12 13:27:58 - Flushing DNS
I 2016.07.12 13:27:58 - Checking route
I 2016.07.12 13:27:59 - Checking DNS
! 2016.07.12 13:27:59 - Connected.
. 2016.07.12 13:27:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.12 13:27:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.12 13:35:26 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.07.12 13:35:26 - SSL > 2016.07.12 13:35:26 LOG6[0]: writesocket: Socket is closed
. 2016.07.12 13:35:26 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.07.12 13:35:26 - SSL > 2016.07.12 13:35:26 LOG6[0]: SSL_shutdown successfully sent close_notify alert
. 2016.07.12 13:35:26 - SSL > 2016.07.12 13:35:26 LOG5[0]: Connection closed: 326415985 byte(s) sent to SSL, 739130452 byte(s) sent to socket
. 2016.07.12 13:35:26 - OpenVPN > Restart pause, 5 second(s)
! 2016.07.12 13:35:26 - Disconnecting
. 2016.07.12 13:35:26 - Management - Send 'signal SIGTERM'
. 2016.07.12 13:35:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.12 13:35:26 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.07.12 13:35:26 - OpenVPN > Assertion failed at misc.c:779
. 2016.07.12 13:35:26 - OpenVPN > Exiting due to fatal error
. 2016.07.12 13:35:26 - Connection terminated.
I 2016.07.12 13:35:26 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.12 13:35:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.12 13:35:29 - Checking authorization ...

Share this post


Link to post

Maybe try a different TAP driver.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Maybe try a different TAP driver.

i guess I can try it, although the reason Ive stuck to 9.0.0.21 is other versions gave me serious problems with constant BSOD errors.

 

Anyway il give it a shot, thanks

Share this post


Link to post

 

Maybe try a different TAP driver.

i guess I can try it, although the reason Ive stuck to 9.0.0.21 is other versions gave me serious problems with constant BSOD errors.

 

Anyway il give it a shot, thanks

 

Regarding TAP...


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

So the different TAP driver seems to have fixed the problem.  Ive tried numerous versions and did get a lot of errors, but i've been using 9.0.0.9 since last night and so far haven't had any crashes or disconnections.

 

Thanks

Share this post


Link to post

Unfortunately the problem has started up again.

 

Haven't changed a single thing, nothing has been updated, no new programs have been installed, anti-virus and firewall settings haven't been touched.

 

 

 

I 2016.07.21 11:40:43 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.07.21 11:40:43 - Reading options from C:\Users\J\AppData\Local\AirVPN\AirVPN.xml
. 2016.07.21 11:40:43 - Data Path: C:\Users\J\AppData\Local\AirVPN
. 2016.07.21 11:40:43 - App Path: C:\Program Files\AirVPN
. 2016.07.21 11:40:43 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.07.21 11:40:43 - Command line arguments (1): path="home"
. 2016.07.21 11:40:43 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2016.07.21 11:40:43 - Updating systems & servers data ...
I 2016.07.21 11:40:43 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.1
I 2016.07.21 11:40:43 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.07.21 11:40:43 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.07.21 11:40:43 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.07.21 11:40:43 - Ready
. 2016.07.21 11:40:44 - Systems & servers data update completed
I 2016.07.21 11:40:56 - Session starting.
I 2016.07.21 11:40:56 - Network adapter DHCP switched to static (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 11:40:59 - Checking authorization ...
W 2016.07.21 11:40:59 - Authorization check failed, continue anyway ({1])
! 2016.07.21 11:40:59 - Connecting to Alshat (Netherlands, Alblasserdam)
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:40:59 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:40:59 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:40:59 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:40:59 LOG5[ui]: Reading configuration from file C:\Users\J\AppData\Local\AirVPN\b14d43eb29071a8aa59faf554734dd3393241f6acd85a1e7292f9522fc79ec38.tmp.ssl
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:40:59 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG6[ui]: Initializing service [openvpn]
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG5[ui]: Configuration successful
. 2016.07.21 11:41:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.21 11:41:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.21 11:41:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.21 11:41:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.21 11:41:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:41:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:41:00 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.21 11:41:00 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:28504 [nonblock]
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49215
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG6[0]: Failover strategy: round-robin
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG6[0]: s_connect: connecting 213.152.161.6:443
. 2016.07.21 11:41:00 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:28504
. 2016.07.21 11:41:00 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.21 11:41:00 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:28504
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG5[0]: s_connect: connected 213.152.161.6:443
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:49216
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG6[0]: SNI: sending servername: 213.152.161.6
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG6[0]: CERT: Locally installed certificate matched
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG6[0]: SSL connected: new session negotiated
. 2016.07.21 11:41:00 - SSL > 2016.07.21 11:41:00 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.07.21 11:41:00 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:28504, sid=91ff7a30 54adbd67
. 2016.07.21 11:41:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.21 11:41:00 - OpenVPN > Validating certificate key usage
. 2016.07.21 11:41:00 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.21 11:41:00 - OpenVPN > VERIFY KU OK
. 2016.07.21 11:41:00 - OpenVPN > Validating certificate extended key usage
. 2016.07.21 11:41:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.21 11:41:00 - OpenVPN > VERIFY EKU OK
. 2016.07.21 11:41:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.21 11:41:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 11:41:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:41:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 11:41:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:41:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.21 11:41:00 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:28504
. 2016.07.21 11:41:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.21 11:41:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.245 255.255.0.0'
. 2016.07.21 11:41:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.21 11:41:03 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.21 11:41:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.21 11:41:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.21 11:41:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.21 11:41:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.21 11:41:03 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.21 11:41:03 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.21 11:41:03 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{1592787E-EAE0-432D-98E6-A8925151588C}.tap
. 2016.07.21 11:41:03 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.21 11:41:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.245/255.255.0.0 [sUCCEEDED]
. 2016.07.21 11:41:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.245/255.255.0.0 on interface {1592787E-EAE0-432D-98E6-A8925151588C} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.07.21 11:41:03 - OpenVPN > Successful ARP Flush on interface [12] {1592787E-EAE0-432D-98E6-A8925151588C}
. 2016.07.21 11:41:08 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.07.21 11:41:08 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:41:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.21 11:41:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:41:08 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:41:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.21 11:41:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:41:08 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:41:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.21 11:41:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:41:08 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.6 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:41:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.21 11:41:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:41:08 - Starting Management Interface
. 2016.07.21 11:41:08 - OpenVPN > Initialization Sequence Completed
I 2016.07.21 11:41:08 - DNS of a network adapter forced (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 11:41:08 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.21 11:41:08 - Flushing DNS
I 2016.07.21 11:41:08 - Checking route
I 2016.07.21 11:41:08 - Checking DNS
! 2016.07.21 11:41:08 - Connected.
. 2016.07.21 11:41:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.21 11:41:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.07.21 11:56:49 - Disconnecting
. 2016.07.21 11:56:49 - Management - Send 'signal SIGTERM'
. 2016.07.21 11:56:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.21 11:56:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.6 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:56:49 - SSL > 2016.07.21 11:56:49 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.07.21 11:56:49 - SSL > 2016.07.21 11:56:49 LOG5[0]: Connection reset: 716742158 byte(s) sent to SSL, 1093047845 byte(s) sent to socket
. 2016.07.21 11:56:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:56:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:56:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:56:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:56:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:56:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:56:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:56:49 - OpenVPN > Closing TUN/TAP interface
. 2016.07.21 11:56:49 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.07.21 11:56:49 - Connection terminated.
I 2016.07.21 11:56:49 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 11:56:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.21 11:56:52 - Checking authorization ...
! 2016.07.21 11:56:52 - Connecting to Seginus (Germany, Frankfurt)
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[ui]: Reading configuration from file C:\Users\J\AppData\Local\AirVPN\4d58f2308e5709c21f57417f0f34b3f494dc6427fad181c14e1726783d6ccf27.tmp.ssl
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG6[ui]: Initializing service [openvpn]
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[ui]: Configuration successful
. 2016.07.21 11:56:53 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.21 11:56:53 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.21 11:56:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.21 11:56:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.21 11:56:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:56:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:56:53 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.21 11:56:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:55132 [nonblock]
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51796
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG6[0]: Failover strategy: round-robin
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG6[0]: s_connect: connecting 178.162.198.110:443
. 2016.07.21 11:56:53 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:55132
. 2016.07.21 11:56:53 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.21 11:56:53 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55132
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[0]: s_connect: connected 178.162.198.110:443
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:51797
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG6[0]: SNI: sending servername: 178.162.198.110
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG6[0]: CERT: Locally installed certificate matched
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG6[0]: SSL connected: new session negotiated
. 2016.07.21 11:56:53 - SSL > 2016.07.21 11:56:53 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.07.21 11:56:53 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:55132, sid=97dbca94 93ef76c1
. 2016.07.21 11:56:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.21 11:56:53 - OpenVPN > Validating certificate key usage
. 2016.07.21 11:56:53 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.21 11:56:53 - OpenVPN > VERIFY KU OK
. 2016.07.21 11:56:53 - OpenVPN > Validating certificate extended key usage
. 2016.07.21 11:56:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.21 11:56:53 - OpenVPN > VERIFY EKU OK
. 2016.07.21 11:56:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.21 11:56:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 11:56:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:56:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 11:56:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:56:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.21 11:56:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:55132
. 2016.07.21 11:56:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.21 11:56:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.3.57 255.255.0.0'
. 2016.07.21 11:56:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.21 11:56:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.21 11:56:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.21 11:56:56 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.21 11:56:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.21 11:56:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.21 11:56:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.21 11:56:56 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.21 11:56:56 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{1592787E-EAE0-432D-98E6-A8925151588C}.tap
. 2016.07.21 11:56:56 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.21 11:56:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.3.57/255.255.0.0 [sUCCEEDED]
. 2016.07.21 11:56:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.3.57/255.255.0.0 on interface {1592787E-EAE0-432D-98E6-A8925151588C} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.07.21 11:56:56 - OpenVPN > Successful ARP Flush on interface [12] {1592787E-EAE0-432D-98E6-A8925151588C}
. 2016.07.21 11:57:01 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.07.21 11:57:01 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:57:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.21 11:57:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:57:01 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:57:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.21 11:57:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:57:01 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:57:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.21 11:57:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:57:01 - OpenVPN > C:\Windows\system32\route.exe ADD 178.162.198.110 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:57:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.21 11:57:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:57:01 - Starting Management Interface
. 2016.07.21 11:57:01 - OpenVPN > Initialization Sequence Completed
I 2016.07.21 11:57:01 - DNS of a network adapter forced (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 11:57:01 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.21 11:57:01 - Flushing DNS
I 2016.07.21 11:57:01 - Checking route
I 2016.07.21 11:57:02 - Checking DNS
! 2016.07.21 11:57:02 - Connected.
. 2016.07.21 11:57:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.21 11:57:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.07.21 11:58:06 - Disconnecting
. 2016.07.21 11:58:06 - Management - Send 'signal SIGTERM'
. 2016.07.21 11:58:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.21 11:58:06 - SSL > 2016.07.21 11:58:06 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.07.21 11:58:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 178.162.198.110 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:58:06 - SSL > 2016.07.21 11:58:06 LOG5[0]: Connection reset: 523165 byte(s) sent to SSL, 556327 byte(s) sent to socket
. 2016.07.21 11:58:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:58:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:58:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:06 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:58:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:06 - OpenVPN > Closing TUN/TAP interface
. 2016.07.21 11:58:06 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.07.21 11:58:06 - Connection terminated.
I 2016.07.21 11:58:06 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 11:58:06 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.21 11:58:09 - Checking authorization ...
! 2016.07.21 11:58:09 - Connecting to Alshat (Netherlands, Alblasserdam)
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[ui]: Reading configuration from file C:\Users\J\AppData\Local\AirVPN\a6331b8ae785f17988b1325067c6047510387cfd8fdfa8909785eb8a1824161a.tmp.ssl
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG6[ui]: Initializing service [openvpn]
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[ui]: Configuration successful
. 2016.07.21 11:58:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.21 11:58:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.21 11:58:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.21 11:58:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.21 11:58:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:58:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:58:09 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.21 11:58:09 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:63902 [nonblock]
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51983
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG6[0]: Failover strategy: round-robin
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG6[0]: s_connect: connecting 213.152.161.6:443
. 2016.07.21 11:58:09 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:63902
. 2016.07.21 11:58:09 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.21 11:58:09 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:63902
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[0]: s_connect: connected 213.152.161.6:443
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:51984
. 2016.07.21 11:58:09 - SSL > 2016.07.21 11:58:09 LOG6[0]: SNI: sending servername: 213.152.161.6
. 2016.07.21 11:58:10 - SSL > 2016.07.21 11:58:10 LOG6[0]: CERT: Locally installed certificate matched
. 2016.07.21 11:58:10 - SSL > 2016.07.21 11:58:10 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.07.21 11:58:10 - SSL > 2016.07.21 11:58:10 LOG6[0]: SSL connected: new session negotiated
. 2016.07.21 11:58:10 - SSL > 2016.07.21 11:58:10 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.07.21 11:58:10 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:63902, sid=b3f17c79 469457ec
. 2016.07.21 11:58:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.21 11:58:10 - OpenVPN > Validating certificate key usage
. 2016.07.21 11:58:10 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.21 11:58:10 - OpenVPN > VERIFY KU OK
. 2016.07.21 11:58:10 - OpenVPN > Validating certificate extended key usage
. 2016.07.21 11:58:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.21 11:58:10 - OpenVPN > VERIFY EKU OK
. 2016.07.21 11:58:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.21 11:58:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 11:58:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:58:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 11:58:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 11:58:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.21 11:58:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:63902
. 2016.07.21 11:58:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.21 11:58:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.245 255.255.0.0'
. 2016.07.21 11:58:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.21 11:58:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.21 11:58:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.21 11:58:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.21 11:58:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.21 11:58:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.21 11:58:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.21 11:58:12 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.21 11:58:12 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{1592787E-EAE0-432D-98E6-A8925151588C}.tap
. 2016.07.21 11:58:12 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.21 11:58:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.245/255.255.0.0 [sUCCEEDED]
. 2016.07.21 11:58:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.245/255.255.0.0 on interface {1592787E-EAE0-432D-98E6-A8925151588C} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.07.21 11:58:12 - OpenVPN > Successful ARP Flush on interface [12] {1592787E-EAE0-432D-98E6-A8925151588C}
. 2016.07.21 11:58:17 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.07.21 11:58:17 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.21 11:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:17 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.21 11:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:17 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.21 11:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.21 11:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:17 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.6 MASK 255.255.255.255 192.168.1.254
. 2016.07.21 11:58:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.21 11:58:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.21 11:58:17 - Starting Management Interface
. 2016.07.21 11:58:17 - OpenVPN > Initialization Sequence Completed
I 2016.07.21 11:58:17 - DNS of a network adapter forced (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 11:58:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.21 11:58:17 - Flushing DNS
I 2016.07.21 11:58:17 - Checking route
I 2016.07.21 11:58:17 - Checking DNS
! 2016.07.21 11:58:18 - Connected.
. 2016.07.21 11:58:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.21 11:58:18 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.21 12:10:44 - Updating systems & servers data ...
. 2016.07.21 12:10:45 - Systems & servers data update completed
. 2016.07.21 12:40:45 - Updating systems & servers data ...
. 2016.07.21 12:40:45 - Systems & servers data update completed
. 2016.07.21 12:58:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.21 12:58:10 - OpenVPN > Validating certificate key usage
. 2016.07.21 12:58:10 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.21 12:58:10 - OpenVPN > VERIFY KU OK
. 2016.07.21 12:58:10 - OpenVPN > Validating certificate extended key usage
. 2016.07.21 12:58:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.21 12:58:10 - OpenVPN > VERIFY EKU OK
. 2016.07.21 12:58:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.21 12:58:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 12:58:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 12:58:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 12:58:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 12:58:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.21 13:10:45 - Updating systems & servers data ...
. 2016.07.21 13:10:47 - Systems & servers data update completed
. 2016.07.21 13:40:47 - Updating systems & servers data ...
. 2016.07.21 13:40:48 - Systems & servers data update completed
I 2016.07.21 13:58:09 - Renewing TLS key
. 2016.07.21 13:58:09 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.21 13:58:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.21 13:58:11 - OpenVPN > Validating certificate key usage
. 2016.07.21 13:58:11 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.21 13:58:11 - OpenVPN > VERIFY KU OK
. 2016.07.21 13:58:11 - OpenVPN > Validating certificate extended key usage
. 2016.07.21 13:58:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.21 13:58:11 - OpenVPN > VERIFY EKU OK
. 2016.07.21 13:58:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.21 13:58:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 13:58:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 13:58:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.21 13:58:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 13:58:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.21 14:10:48 - Updating systems & servers data ...
. 2016.07.21 14:10:49 - Systems & servers data update completed
. 2016.07.21 14:35:18 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.07.21 14:35:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.07.21 14:35:18 - OpenVPN > Restart pause, 5 second(s)
! 2016.07.21 14:35:18 - Disconnecting
. 2016.07.21 14:35:18 - Management - Send 'signal SIGTERM'
. 2016.07.21 14:35:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.21 14:35:18 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.07.21 14:35:18 - OpenVPN > Assertion failed at misc.c:779
. 2016.07.21 14:35:18 - OpenVPN > Exiting due to fatal error
. 2016.07.21 14:35:18 - Connection terminated.
I 2016.07.21 14:35:18 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 14:35:18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.21 14:35:49 - DHCP of a network adapter restored to original settings (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
! 2016.07.21 14:35:49 - Session terminated.
I 2016.07.21 14:35:54 - Session starting.
I 2016.07.21 14:35:54 - Network adapter DHCP switched to static (Qualcomm Atheros AR8161/8165 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2016.07.21 14:35:57 - Checking authorization ...
! 2016.07.21 14:36:19 - Connecting to Alshat (Netherlands, Alblasserdam)
. 2016.07.21 14:36:44 - SSL > 2016.07.21 14:36:19 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.21 14:36:44 - SSL > 2016.07.21 14:36:19 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.21 14:36:44 - SSL > 2016.07.21 14:36:19 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.21 14:36:44 - SSL > 2016.07.21 14:36:19 LOG5[ui]: Reading configuration from file C:\Users\J\AppData\Local\AirVPN\47d922b613f8294dc8c69dc54ed9a96e95b5981f175ea27423ecd1e24199752b.tmp.ssl
. 2016.07.21 14:36:44 - SSL > 2016.07.21 14:36:19 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.21 14:36:44 - SSL > 2016.07.21 14:36:19 LOG6[ui]: Initializing service [openvpn]
. 2016.07.21 14:36:45 - SSL > 2016.07.21 14:36:19 LOG5[ui]: Configuration successful
. 2016.07.21 14:36:45 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.21 14:36:45 - SSL > 2016.07.21 14:36:45 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:54025
. 2016.07.21 14:36:45 - SSL > 2016.07.21 14:36:45 LOG6[0]: Failover strategy: round-robin
. 2016.07.21 14:36:45 - SSL > 2016.07.21 14:36:45 LOG6[0]: s_connect: connecting 213.152.161.6:443
. 2016.07.21 14:36:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.21 14:36:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.21 14:36:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.21 14:36:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 14:36:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 14:36:45 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.21 14:36:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:50497 [nonblock]
. 2016.07.21 14:36:45 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:50497
. 2016.07.21 14:36:45 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.21 14:36:45 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:50497
. 2016.07.21 14:36:55 - SSL > 2016.07.21 14:36:55 LOG3[0]: s_connect: s_poll_wait 213.152.161.6:443: TIMEOUTconnect exceeded
. 2016.07.21 14:36:55 - OpenVPN > Connection reset, restarting [-1]
. 2016.07.21 14:36:55 - SSL > 2016.07.21 14:36:55 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.07.21 14:36:55 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.07.21 14:36:55 - OpenVPN > Restart pause, 5 second(s)
! 2016.07.21 14:36:55 - Disconnecting
. 2016.07.21 14:36:55 - Connection terminated.
I 2016.07.21 14:36:58 - Checking authorization ...
! 2016.07.21 14:36:58 - Connecting to Tauri (Germany, Frankfurt)
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG5[ui]: Reading configuration from file C:\Users\J\AppData\Local\AirVPN\e578dcb3840f732250f5ee7e801238aee55613defd318b56c257d514a9d7115d.tmp.ssl
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG6[ui]: Initializing service [openvpn]
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG5[ui]: Configuration successful
. 2016.07.21 14:36:58 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.21 14:36:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.21 14:36:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.21 14:36:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.21 14:36:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 14:36:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 14:36:58 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.21 14:36:58 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:22800 [nonblock]
. 2016.07.21 14:36:58 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:22800
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:54051
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG6[0]: Failover strategy: round-robin
. 2016.07.21 14:36:58 - SSL > 2016.07.21 14:36:58 LOG6[0]: s_connect: connecting 46.165.208.106:443
. 2016.07.21 14:36:58 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.21 14:36:58 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:22800
. 2016.07.21 14:37:08 - SSL > 2016.07.21 14:37:08 LOG3[0]: s_connect: s_poll_wait 46.165.208.106:443: TIMEOUTconnect exceeded
. 2016.07.21 14:37:08 - SSL > 2016.07.21 14:37:08 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.07.21 14:37:08 - OpenVPN > Connection reset, restarting [-1]
. 2016.07.21 14:37:08 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.07.21 14:37:08 - OpenVPN > Restart pause, 5 second(s)
! 2016.07.21 14:37:08 - Disconnecting
. 2016.07.21 14:37:08 - Connection terminated.
I 2016.07.21 14:37:11 - Checking authorization ...
! 2016.07.21 14:37:11 - Connecting to Tauri (Germany, Frankfurt)
. 2016.07.21 14:37:11 - SSL > 2016.07.21 14:37:11 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.07.21 14:37:11 - SSL > 2016.07.21 14:37:11 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.07.21 14:37:11 - SSL > 2016.07.21 14:37:11 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.07.21 14:37:11 - SSL > 2016.07.21 14:37:11 LOG5[ui]: Reading configuration from file C:\Users\J\AppData\Local\AirVPN\9d1c9399eaf6226955232d6f3cf583791f6c969bb7fb567d1783e32a3d273f2f.tmp.ssl
. 2016.07.21 14:37:11 - SSL > 2016.07.21 14:37:11 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.07.21 14:37:11 - SSL > 2016.07.21 14:37:11 LOG6[ui]: Initializing service [openvpn]
. 2016.07.21 14:37:11 - SSL > 2016.07.21 14:37:11 LOG5[ui]: Configuration successful
. 2016.07.21 14:37:12 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.21 14:37:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.21 14:37:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.21 14:37:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.21 14:37:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 14:37:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.21 14:37:12 - OpenVPN > Socket Buffers: R=[516096->131072] S=[172032->131072]
. 2016.07.21 14:37:12 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:40288 [nonblock]
. 2016.07.21 14:37:12 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:40288
. 2016.07.21 14:37:12 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.21 14:37:12 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:40288
. 2016.07.21 14:37:12 - SSL > 2016.07.21 14:37:12 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:54067
. 2016.07.21 14:37:12 - SSL > 2016.07.21 14:37:12 LOG6[0]: Failover strategy: round-robin
. 2016.07.21 14:37:12 - SSL > 2016.07.21 14:37:12 LOG6[0]: s_connect: connecting 46.165.208.106:443

Share this post


Link to post

I've already said that I think it's your security software.  Have you tested with all your Kaspersky (or any other 3rd party stuff) disabled?

Share this post


Link to post

As go558a83nk said, maybe you should check your antivirus/firewall exceptions lists; especially your firewall, if you're torrenting.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

As go558a83nk said, maybe you should check your antivirus/firewall exceptions lists; especially your firewall, if you're torrenting.

 

it's about some security software freaking out when all those UDP connections are made by torrenting.  at least that's what I remember from some previous problems that, if I recall correctly, were the same as this sounds.

Share this post


Link to post

 

As go558a83nk said, maybe you should check your antivirus/firewall exceptions lists; especially your firewall, if you're torrenting.

 

it's about some security software freaking out when all those UDP connections are made by torrenting.  at least that's what I remember from some previous problems that, if I recall correctly, were the same as this sounds.

Sounds reasonable. But you know, you can't tell a firewall a UDP joke, because they just don't get it.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...