Jump to content
Not connected, Your IP: 18.119.143.45
DeadCat69

Strange speed difference between Torrent client and Eddie client

Recommended Posts

First day on AirVPN. After about 30 minutes I changed server. Reconnect in infinite loop. Shut down AirVPN and restarted - no change. Shut down everything, ran CCleaner, and rebooted. AirVPN came back up without any loops. Changed servers several times - no problem connecting. Another issue showed up when changing servers. Before changing servers ChilliTorrent speed display was close to AirVPN. After changing to a different server with faster response time, ChilliTorrent increased in speed (more than doubled to 900+ Kb/s and fairly steady. AirVPN download displayed 0-100 b/s (most of the time at zero). Upload speed was also near zero.

 

My first thought was that the torrent was not going through the VPN. Leak tests and IP verification passed. Changed again to another server with same results. Shut down AirVPN and logged in again. Same results. Changed to another country. Same results. When everything is shut down, system cleaned and rebooted then AirVPN displays approximately the same as torrent client. This speed indicator issue does not happen on every server change. But when it does is doesn't matter what server is connected including the previous server. It was noticed that AirVPN speed sample is not filtered like the torrent client. 

 

When the torrent client is uploading at 40 Kb/sec and the VPN display consistently shows less than 200 b/s and torrent is downloading at 900 Kb/s and VPN shows less than 200 b/s, and mostly zero, something seems amiss. Should there be concern about the traffic not going through the VPN? The lock is always activated before connecting to a server and in all cases the closed lock is displayed.

 

A little more data. On the resource monitor, listening ports are confined to my computer LAN address, two 10.xxx.xxx.xxx addresses, and fe80::d8a:d521:4fd6:1a30 from svchost.exe (localServiceAndNoImpersonation). On TCP connections, only my computer and a single 10.xxx.xxx.xxx addresses are displayed. Remote addresses are as expected - all over the map.

 

Anyone have any thoughts on what to look at next? This doesn't seem to be a leak.

 

Any concern on my part is the initial setup was almost too easy. I chose open VPN and was up and running in a few minutes. Nice job on a good customer interface. 

Share this post


Link to post
Guest

Well reading through it I was rather convinced it was due to traffic not going through the VPN, however if you say network lock is enabled it shouldn't be able to HOWEVER then I read that you actually have an IPv6 address which I'm afraid is usually the cause for quite a few leaks around here with and without network lock, the AirVPN interface shows the traffic going through the OpenVPN daemon for a better view to be sure if you got Windows 8.1 go to task manager and in process when using the torrent client filter with network and see if ANY traffic isn't going through the OpenVPN daemon also a copy of your logs from AirVPN client Eddie and anything else would be appreciated/required given we are shooting dark here with only speculations.

Share this post


Link to post

Thanks for the reply.

 

I am running Windows 7 Professional 32 bit

What follows is a description of my actions and observed results. Corresponding log file follows.

Process Log 1

Started with preferred server.

Changed to Yildun
Download Torrent 900+ kB/s - Eddie 6kB/s
Upload Torrent 50 Kb/s - Eddie <1 Kb/s


Changed server to Azha
Download Torrent 700+ kB/s - Eddie between 0 and 40 kB/s
Upload Torrent 50+ kB/s - Eddie between 1 and 3 kB/s

Changed server to Tauri
Download Torrent 6 kB/s - Eddie about the same ; not a good server for download
Upload Torrent 70 kB/s - Eddie 20 kb/s

Disconnected from server, Network Still Locked
Torrent still going full speed!

ipleak.net:
No leak, RTCPeerConnection
Both IP addresses shown are local ISP
AirVPN Exit Node: NO

With Network Lock still indicating lock the raw unprotected network is fully functional!

It appears that when connected to a server and networked locked 90%+ of the IP traffic
is not going through the VPN. The Network Lock indication appears to be a false positive.

Deactivated Network Lock
Connected to Marfic
Internet is disabled - nothing going through connected server
Lock display is "Unlocked" but browser is cut off

Disconnected from server - internet is live again

Activated Network Lock
Not connected to a server
Internet is full on!


Is it necessary to implement contents of topic "Blocking non-VPN
traffic with Windows Firewall?" I thought the contents of this topic was
implemented with "Network Lock."

 

I 2016.07.15 19:02:30 - Checking login ...
! 2016.07.15 19:02:30 - Logged in.
! 2016.07.15 19:02:37 - Activation of Network Lock - Windows Firewall
I 2016.07.15 19:02:49 - Session starting.
I 2016.07.15 19:02:49 - IPv6 disabled.
I 2016.07.15 19:02:49 - Checking authorization ...
! 2016.07.15 19:02:49 - Connecting to Marfic (France, Paris)
. 2016.07.15 19:02:50 - OpenVPN > OpenVPN 2.3.8 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.15 19:02:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.15 19:02:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.15 19:02:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.15 19:02:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:02:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:02:50 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.15 19:02:50 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.15 19:02:50 - OpenVPN > UDPv4 link remote: [AF_INET]195.154.194.18:443
. 2016.07.15 19:02:50 - OpenVPN > TLS: Initial packet from [AF_INET]195.154.194.18:443, sid=140b84a7 69506981
. 2016.07.15 19:02:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.15 19:02:50 - OpenVPN > Validating certificate key usage
. 2016.07.15 19:02:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.15 19:02:50 - OpenVPN > VERIFY KU OK
. 2016.07.15 19:02:50 - OpenVPN > Validating certificate extended key usage
. 2016.07.15 19:02:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.15 19:02:50 - OpenVPN > VERIFY EKU OK
. 2016.07.15 19:02:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.15 19:02:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:02:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:02:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:02:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:02:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.15 19:02:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]195.154.194.18:443
. 2016.07.15 19:02:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.15 19:02:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.108 255.255.0.0'
. 2016.07.15 19:02:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.15 19:02:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.15 19:02:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.15 19:02:58 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.15 19:02:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.15 19:02:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.15 19:02:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.15 19:02:58 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.15 19:02:58 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}.tap
. 2016.07.15 19:02:58 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.15 19:02:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.108/255.255.0.0 [sUCCEEDED]
. 2016.07.15 19:02:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.108/255.255.0.0 on interface {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.15 19:02:58 - OpenVPN > Successful ARP Flush on interface [16] {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}
. 2016.07.15 19:03:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.15 19:03:03 - OpenVPN > C:\Windows\system32\route.exe ADD 195.154.194.18 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:03:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:03:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:03:03 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.15 19:03:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:03:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:03:03 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:03:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:03:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:03:03 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:03:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:03:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:03:03 - Starting Management Interface
. 2016.07.15 19:03:03 - OpenVPN > Initialization Sequence Completed
I 2016.07.15 19:03:03 - DNS of a network adapter forced (NVIDIA nForce Networking Controller)
I 2016.07.15 19:03:04 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.15 19:03:04 - Flushing DNS
I 2016.07.15 19:03:04 - Checking route
I 2016.07.15 19:03:05 - Checking DNS
! 2016.07.15 19:03:06 - Connected.
. 2016.07.15 19:03:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.15 19:03:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.07.15 19:13:39 - Disconnecting
. 2016.07.15 19:13:39 - Management - Send 'signal SIGTERM'
. 2016.07.15 19:13:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.15 19:13:39 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.15 19:13:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 195.154.194.18 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:13:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:13:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:13:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:13:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:13:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:13:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:13:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:13:44 - OpenVPN > Closing TUN/TAP interface
. 2016.07.15 19:13:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.15 19:13:44 - Connection terminated.
I 2016.07.15 19:13:44 - DNS of a network adapter restored to original settings (NVIDIA nForce Networking Controller)
I 2016.07.15 19:13:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.15 19:13:47 - Checking authorization ...
! 2016.07.15 19:13:47 - Connecting to Yildun (United States, Miami)
. 2016.07.15 19:13:48 - OpenVPN > OpenVPN 2.3.8 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.15 19:13:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.15 19:13:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.15 19:13:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.15 19:13:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:13:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:13:48 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.15 19:13:48 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.15 19:13:48 - OpenVPN > UDPv4 link remote: [AF_INET]173.44.55.178:443
. 2016.07.15 19:13:48 - OpenVPN > TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=75d1602a 61867eaa
. 2016.07.15 19:13:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.15 19:13:48 - OpenVPN > Validating certificate key usage
. 2016.07.15 19:13:48 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.15 19:13:48 - OpenVPN > VERIFY KU OK
. 2016.07.15 19:13:48 - OpenVPN > Validating certificate extended key usage
. 2016.07.15 19:13:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.15 19:13:48 - OpenVPN > VERIFY EKU OK
. 2016.07.15 19:13:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.15 19:13:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:13:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:13:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:13:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:13:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.15 19:13:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443
. 2016.07.15 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.15 19:14:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.220 255.255.0.0'
. 2016.07.15 19:14:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.15 19:14:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.15 19:14:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.15 19:14:01 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.15 19:14:01 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.15 19:14:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.15 19:14:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.15 19:14:01 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.15 19:14:01 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}.tap
. 2016.07.15 19:14:01 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.15 19:14:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.44.220/255.255.0.0 [sUCCEEDED]
. 2016.07.15 19:14:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.44.220/255.255.0.0 on interface {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.15 19:14:01 - OpenVPN > Successful ARP Flush on interface [16] {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}
. 2016.07.15 19:14:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.15 19:14:06 - OpenVPN > C:\Windows\system32\route.exe ADD 173.44.55.178 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:14:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:14:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:14:06 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.15 19:14:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:14:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:14:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:14:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:14:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:14:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:14:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:14:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:14:06 - Starting Management Interface
. 2016.07.15 19:14:06 - OpenVPN > Initialization Sequence Completed
I 2016.07.15 19:14:06 - DNS of a network adapter forced (NVIDIA nForce Networking Controller)
I 2016.07.15 19:14:06 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.15 19:14:06 - Flushing DNS
I 2016.07.15 19:14:07 - Checking route
I 2016.07.15 19:14:07 - Checking DNS
! 2016.07.15 19:14:08 - Connected.
. 2016.07.15 19:14:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.15 19:14:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.15 19:31:34 - Updating systems & servers data ...
. 2016.07.15 19:31:37 - Systems & servers data update completed
! 2016.07.15 19:34:43 - Disconnecting
. 2016.07.15 19:34:43 - Management - Send 'signal SIGTERM'
. 2016.07.15 19:34:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.15 19:34:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.15 19:34:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 173.44.55.178 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:34:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:34:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:34:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:34:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:34:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:34:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:34:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:34:48 - OpenVPN > Closing TUN/TAP interface
. 2016.07.15 19:34:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.15 19:34:48 - Connection terminated.
I 2016.07.15 19:34:48 - DNS of a network adapter restored to original settings (NVIDIA nForce Networking Controller)
I 2016.07.15 19:34:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.15 19:34:51 - Checking authorization ...
! 2016.07.15 19:34:51 - Connecting to Azha (United States, Atlanta, Georgia)
. 2016.07.15 19:34:52 - OpenVPN > OpenVPN 2.3.8 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.15 19:34:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.15 19:34:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.15 19:34:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.15 19:34:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:34:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:34:52 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.15 19:34:52 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.15 19:34:52 - OpenVPN > UDPv4 link remote: [AF_INET]104.129.24.186:443
. 2016.07.15 19:34:52 - OpenVPN > TLS: Initial packet from [AF_INET]104.129.24.186:443, sid=30ba13fa c822ee3b
. 2016.07.15 19:34:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.15 19:34:52 - OpenVPN > Validating certificate key usage
. 2016.07.15 19:34:52 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.15 19:34:52 - OpenVPN > VERIFY KU OK
. 2016.07.15 19:34:52 - OpenVPN > Validating certificate extended key usage
. 2016.07.15 19:34:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.15 19:34:52 - OpenVPN > VERIFY EKU OK
. 2016.07.15 19:34:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.15 19:34:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:34:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:34:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:34:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:34:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.15 19:34:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.129.24.186:443
. 2016.07.15 19:34:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.15 19:34:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.177 255.255.0.0'
. 2016.07.15 19:34:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.15 19:34:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.15 19:34:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.15 19:34:56 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.15 19:34:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.15 19:34:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.15 19:34:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.15 19:34:56 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.15 19:34:56 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}.tap
. 2016.07.15 19:34:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.15 19:34:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.177/255.255.0.0 [sUCCEEDED]
. 2016.07.15 19:34:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.177/255.255.0.0 on interface {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.15 19:34:56 - OpenVPN > Successful ARP Flush on interface [16] {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}
. 2016.07.15 19:35:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.15 19:35:02 - OpenVPN > C:\Windows\system32\route.exe ADD 104.129.24.186 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:35:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:35:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:35:02 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.15 19:35:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:35:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:35:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:35:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:35:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:35:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:35:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:35:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:35:02 - Starting Management Interface
. 2016.07.15 19:35:02 - OpenVPN > Initialization Sequence Completed
I 2016.07.15 19:35:02 - DNS of a network adapter forced (NVIDIA nForce Networking Controller)
I 2016.07.15 19:35:02 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.15 19:35:02 - Flushing DNS
I 2016.07.15 19:35:02 - Checking route
I 2016.07.15 19:35:03 - Checking DNS
! 2016.07.15 19:35:04 - Connected.
. 2016.07.15 19:35:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.15 19:35:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.07.15 19:38:21 - Disconnecting
. 2016.07.15 19:38:21 - Management - Send 'signal SIGTERM'
. 2016.07.15 19:38:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.15 19:38:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.15 19:38:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 104.129.24.186 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:38:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:38:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:38:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:38:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:26 - OpenVPN > Closing TUN/TAP interface
. 2016.07.15 19:38:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.15 19:38:26 - Connection terminated.
I 2016.07.15 19:38:26 - DNS of a network adapter restored to original settings (NVIDIA nForce Networking Controller)
I 2016.07.15 19:38:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.15 19:38:29 - Checking authorization ...
! 2016.07.15 19:38:30 - Connecting to Tauri (Germany, Frankfurt)
. 2016.07.15 19:38:30 - OpenVPN > OpenVPN 2.3.8 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.15 19:38:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.15 19:38:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.15 19:38:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.15 19:38:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:38:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:38:30 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.15 19:38:30 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.15 19:38:30 - OpenVPN > UDPv4 link remote: [AF_INET]46.165.208.65:443
. 2016.07.15 19:38:30 - OpenVPN > TLS: Initial packet from [AF_INET]46.165.208.65:443, sid=df96a516 07ba3e56
. 2016.07.15 19:38:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.15 19:38:31 - OpenVPN > Validating certificate key usage
. 2016.07.15 19:38:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.15 19:38:31 - OpenVPN > VERIFY KU OK
. 2016.07.15 19:38:31 - OpenVPN > Validating certificate extended key usage
. 2016.07.15 19:38:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.15 19:38:31 - OpenVPN > VERIFY EKU OK
. 2016.07.15 19:38:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.15 19:38:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:38:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:38:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 19:38:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 19:38:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.15 19:38:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.165.208.65:443
. 2016.07.15 19:38:35 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.15 19:38:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.29.150 255.255.0.0'
. 2016.07.15 19:38:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.15 19:38:35 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.15 19:38:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.15 19:38:35 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.15 19:38:35 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.15 19:38:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.15 19:38:35 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.15 19:38:35 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.15 19:38:35 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}.tap
. 2016.07.15 19:38:35 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.15 19:38:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.29.150/255.255.0.0 [sUCCEEDED]
. 2016.07.15 19:38:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.29.150/255.255.0.0 on interface {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.15 19:38:35 - OpenVPN > Successful ARP Flush on interface [16] {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}
. 2016.07.15 19:38:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.15 19:38:41 - OpenVPN > C:\Windows\system32\route.exe ADD 46.165.208.65 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:38:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:38:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:41 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.15 19:38:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 19:38:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:38:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:38:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:38:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 19:38:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 19:38:41 - Starting Management Interface
. 2016.07.15 19:38:41 - OpenVPN > Initialization Sequence Completed
I 2016.07.15 19:38:41 - DNS of a network adapter forced (NVIDIA nForce Networking Controller)
I 2016.07.15 19:38:41 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.15 19:38:41 - Flushing DNS
I 2016.07.15 19:38:41 - Checking route
I 2016.07.15 19:38:43 - Checking DNS
! 2016.07.15 19:38:43 - Connected.
. 2016.07.15 19:38:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.15 19:38:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.07.15 19:48:08 - Disconnecting
. 2016.07.15 19:48:08 - Management - Send 'signal SIGTERM'
. 2016.07.15 19:48:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.15 19:48:08 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.15 19:48:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.165.208.65 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:48:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:48:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 19:48:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:48:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:48:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:48:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 19:48:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 19:48:13 - OpenVPN > Closing TUN/TAP interface
. 2016.07.15 19:48:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.15 19:48:13 - Connection terminated.
I 2016.07.15 19:48:13 - DNS of a network adapter restored to original settings (NVIDIA nForce Networking Controller)
I 2016.07.15 19:48:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.15 19:48:13 - IPv6 restored.
! 2016.07.15 19:48:13 - Session terminated.
. 2016.07.15 20:01:37 - Updating systems & servers data ...
. 2016.07.15 20:01:38 - Systems & servers data update completed
! 2016.07.15 20:06:45 - Deactivation of Network Lock
I 2016.07.15 20:07:41 - Session starting.
I 2016.07.15 20:07:41 - IPv6 disabled.
I 2016.07.15 20:07:41 - Checking authorization ...
! 2016.07.15 20:07:41 - Connecting to Marfic (France, Paris)
. 2016.07.15 20:07:42 - OpenVPN > OpenVPN 2.3.8 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.07.15 20:07:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.07.15 20:07:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.15 20:07:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.15 20:07:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 20:07:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 20:07:42 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2016.07.15 20:07:42 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.15 20:07:42 - OpenVPN > UDPv4 link remote: [AF_INET]195.154.194.18:443
. 2016.07.15 20:07:42 - OpenVPN > TLS: Initial packet from [AF_INET]195.154.194.18:443, sid=1b63b6e6 7f49fbe2
. 2016.07.15 20:07:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.15 20:07:42 - OpenVPN > Validating certificate key usage
. 2016.07.15 20:07:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.15 20:07:42 - OpenVPN > VERIFY KU OK
. 2016.07.15 20:07:42 - OpenVPN > Validating certificate extended key usage
. 2016.07.15 20:07:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.15 20:07:42 - OpenVPN > VERIFY EKU OK
. 2016.07.15 20:07:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.15 20:07:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 20:07:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 20:07:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.15 20:07:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.15 20:07:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.15 20:07:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]195.154.194.18:443
. 2016.07.15 20:07:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.15 20:07:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.108 255.255.0.0'
. 2016.07.15 20:07:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.15 20:07:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.15 20:07:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.15 20:07:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.15 20:07:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.15 20:07:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.15 20:07:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.15 20:07:46 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.15 20:07:46 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}.tap
. 2016.07.15 20:07:46 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.15 20:07:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.108/255.255.0.0 [sUCCEEDED]
. 2016.07.15 20:07:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.108/255.255.0.0 on interface {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.15 20:07:46 - OpenVPN > Successful ARP Flush on interface [16] {52218B73-F90C-4798-8AF4-7DEBD5C4FAB3}
. 2016.07.15 20:07:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.15 20:07:51 - OpenVPN > C:\Windows\system32\route.exe ADD 195.154.194.18 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 20:07:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 20:07:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 20:07:51 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 11
. 2016.07.15 20:07:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.15 20:07:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 20:07:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 20:07:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 20:07:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 20:07:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 20:07:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.15 20:07:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.15 20:07:51 - Starting Management Interface
. 2016.07.15 20:07:51 - OpenVPN > Initialization Sequence Completed
I 2016.07.15 20:07:52 - DNS of a network adapter forced (NVIDIA nForce Networking Controller)
I 2016.07.15 20:07:52 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.07.15 20:07:52 - Flushing DNS
I 2016.07.15 20:07:52 - Checking route
I 2016.07.15 20:07:53 - Checking DNS
! 2016.07.15 20:07:54 - Connected.
. 2016.07.15 20:07:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.15 20:07:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.07.15 20:11:47 - Disconnecting
. 2016.07.15 20:11:47 - Management - Send 'signal SIGTERM'
. 2016.07.15 20:11:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.15 20:11:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.15 20:11:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 195.154.194.18 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 20:11:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 20:11:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.07.15 20:11:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 20:11:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 20:11:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 20:11:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.15 20:11:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.15 20:11:52 - OpenVPN > Closing TUN/TAP interface
. 2016.07.15 20:11:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.15 20:11:52 - Connection terminated.
I 2016.07.15 20:11:52 - DNS of a network adapter restored to original settings (NVIDIA nForce Networking Controller)
I 2016.07.15 20:11:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.07.15 20:11:52 - IPv6 restored.
! 2016.07.15 20:11:52 - Session terminated.
! 2016.07.15 20:12:45 - Activation of Network Lock - Windows Firewall
. 2016.07.15 20:32:38 - Updating systems & servers data ...
. 2016.07.15 20:32:39 - Systems & servers data update completed

Share this post


Link to post
Guest

Alright going through your logs everything seems fine, and what you explained to me makes it sound like when the lock is off it's "on" but when it is on it is "off" that is rather odd, when you enable network lock without connecting to a server try go to the windows firewall and check the rules, it should only have AirVPN - XXXX rules. Anyway another thing I noticed was that you use Tap adapter v9.21 which has been causing a lot of issues for people lately, uninstall the driver which you can do in the GUI under settings advanced, then close AirVPN client and install this one http://swupdate.openvpn.org/community/releases/tap-windows-9.9.2_3.exe

Share this post


Link to post

Hello

 

Welcome to AirVPN!​ (You didn't welcome our new guest, EdenSpire, tsk tsk ​ )

​As per number 3, do disable any adapters that you don't use and make sure you're not changing Windows Firewall. Network Lock relies on WF to do its thing, so if it's messed up, then NL won't work either.

 

So to get to it:

  1. ​Make sure you've done your portforwarding so your Torrenting actually works.
  2. Make sure you've disabled IPv6, as suggested previously.
  3. Try to disable this adapter: DNS of a network adapter restored to original settings (NVIDIA nForce Networking Controller)
  4. Try switch to a potentially better Torrent Client, wherein you can also bind it to the VPN adapter.
  5. Try change your TAP drivers as suggested. You could help giganerd
  6. Consider uninstalling any 3rd party firewalls you have and restoring your Windows firewall to its original settings
  7. Try increasing your buffer size. Check my guide in my signature, in the section to "After" Eddie is downloaded.
  8. Make sure you're using UDP, when you download the config files.
  9. In preferences/Advanced/General you can do things like disable IPv6 and remove the default gateway route.
     

Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Thanks for the reply.

 

Windows 7 Firewall

On the Windows Firewall display there is a note: "These settings are being managed by vendor application Kaspersky Internet Security." The "Home or work (private) networks" shows connected but the shield is red with an X. Public networks shows "Not Connected" with a red shield and X. Selections in the left column are disabled except for advanced settings. "Turn Windows Firewall on or off" has no response. "Advanced settings" displays the in and out rules. Activating AirVPN Network Lock does change all the rules to only permit VPN traffic. But it appears that the Windows Firewall may be disabled by Kaspersky. In Kaspersky I configured a lot of blocks for specific items to disable tracking sites.

 

Even though AirVPN configures the windows firewall rules correctly, perhaps Kaspersky is not allowing windows firewall to be turned on. If I turn Kaspersky's firewall off, control of windows firewall is still under control of Kaspersky although the rules still display VPN rules. Any thoughts on this?

Share this post


Link to post

Then it's immediately much more clear. Either find a way to stop Kaspersky messing with WF or uninstall it. After that, turn off Eddie via its own menus and then click the button which lets you restore WF to factory settings. Then restart the Eddie client, with Network Lock on.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Thanks. EdenSpire welcomed me in the best way possible - by offering to help.

 

EdenSpire - Tap driver was changed as suggested. What I see on the firewall monitoring when Network Lock is activated is: Windows Firewall is on, Outbound connections that do not match a rule changes from allowed to block. Inbound rules that do not match a rule are also blocked.

 

Aside for any torrent use, what I expected from AirVPN is when Network is locked without a server selected my browser should not work but it does. Is my thinking not correct?

Share this post


Link to post

Okay, I think I found the source of the problem but don't understand what to do about it. If Kaspersky firewall is disabled nothing changes. But, if all Kaspersky protection is disabled then Network lock works correctly. Any thoughts on corrective action?

Share this post


Link to post

That's what I said. Meaning you'd probably best just uninstall it. These applications can mess with a variety of settings in a variety of ways. Maybe you could try disabling Kasperky firewall and then restoring WF to factory settings; while Eddie is off. Then starting Eddie again, with Network Lock(NL) on and seeing if it helps. Otherwise you'll have to mess with Kaspersky and find the relevant settings to disable. But if that's too much to do, then I'd just uninstall it. You're correct in that if you're not connected and NL was on, that you shouldn't be able to browse. But since NL relies on WF to work, any messing with WF is going to mess with NL working properly.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Okay, I think I found the source of the problem but don't understand what to do about it. If Kaspersky firewall is disabled nothing changes. But, if all Kaspersky protection is disabled then Network lock works correctly. Any thoughts on corrective action?

 

Look into AirVPN client's permissions in Kaspersky, make sure it's marked trustworthy/green. If it is, doubleclick on it, go to the Exceptions tab and select everything. There's no need to disable all of Kaspersky... unless you're using Total Security which just sucks..


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
Guest

Thanks. EdenSpire welcomed me in the best way possible - by offering to help.

 

EdenSpire - Tap driver was changed as suggested. What I see on the firewall monitoring when Network Lock is activated is: Windows Firewall is on, Outbound connections that do not match a rule changes from allowed to block. Inbound rules that do not match a rule are also blocked.

 

Aside for any torrent use, what I expected from AirVPN is when Network is locked without a server selected my browser should not work but it does. Is my thinking not correct?

 

Sorry didn't see till now, yeah you are correct the Network lock is supposed to block traffic that is not going to the VPN servers owned by AirVPN, Kaspersky is interfering with it and since it's using 3rd Party firewalling anything client Eddie is changing isn't taking effect. What giganerd said might help, I don't exactly know how Kaspersky operates never used it

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...