Staff 9972 Posted ... @LZ1 Network Lock is "not active" if Eddie is not running, unless it crashed. When you shut down the software, previous firewall rules (or WFP settings) are restored. This is precisely consistent on all system and with all previous Eddie versions, nothing has changed. Sockets buffers size are set on system defaults on all OS, except in Windows, where the size picked by the system is not acceptable (too small). See the changelog. The menu button is lighted off. When the mouse pointer slides over it turns on. Kind regards Share this post Link to post
LZ1 672 Posted ... Report TL;DR:I currently can't connect to a server at all, under a Standard account, ever since I tried Eddie on an Admin account.Tried setting Eddie to connect at startup & Windows startup, as well as to enable NL at startup. Eddie then doesn't start under a Standard account and browsingis possible, without protection, even when Network Lock was on previously and set to connect automatically, from the last session.However it starts up fine under an Admin account. After closing down the Admin account, restarting and then going back to a Standard account, Eddie won't start, butinstead crashes by continously throwing an exception. This can be stopped if the reconnection attempts are cancelled Clean install of Win 7 64-bit.Client version: 2.11.2. Here's the exception:Problem signature: Problem Event Name: CLR20r3 Problem Signature 01: airvpn.exe Problem Signature 02: 2.11.0.0 Problem Signature 03: 5793ef20 Problem Signature 04: Platforms.Windows Problem Signature 05: 2.11.0.0 Problem Signature 06: 5793ef18 Problem Signature 07: c Problem Signature 08: 26 Problem Signature 09: System.Exception OS Version: 6.1.7601.2.1.0.768.3 Locale ID: 2057Attempts at changing the Network Lock firewall rule away from WPF to WF doesn't work, but Eddie stops crashing at least and instead tries to connect forever. DeactivatingNL doesn't make the crashes stop and it's still not possible to connect to a server. Even setting the Network Lock back to"Automatic" still causes crashes; even when NL is not on. Changing the NL rule to "None" and not using NL, still means it's notpossible to connect.Running Eddie as Administrator, under a Standard account, with NL off, NL firewall rules set to Automatic and the startup buttons unchecked, still means Eddie can't connect.Tried turning NL off, setting NL rules to automatic and turning off all startup options. Then I restarted and went back into the Standard account.Eddie can't connect to anything. Logs: After changing Eddie to WF: . 2016.07.24 18:20:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:20:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:20:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.139:443. 2016.07.24 18:20:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:20:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.14 255.255.0.0'. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:20:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:20:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:20:22 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:20:22 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:20:22 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:20:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.16.14/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:20:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.16.14/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:20:22 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:20:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.139 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:27 - Starting Management Interface. 2016.07.24 18:20:27 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:20:27 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:20:27 - Disconnecting. 2016.07.24 18:20:27 - Management - Send 'signal SIGTERM'. 2016.07.24 18:20:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:20:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:20:27 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.139 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:20:32 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:20:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:20:32 - Connection terminated.I 2016.07.24 18:20:32 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:20:35 - Checking authorization ...! 2016.07.24 18:20:35 - Connecting to Atik (Netherlands, Alblasserdam). 2016.07.24 18:20:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:20:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:20:35 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:20:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:20:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:20:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:20:35 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:20:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443. 2016.07.24 18:20:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=4f13cc64 dd02edf7. 2016.07.24 18:20:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:20:35 - OpenVPN > Validating certificate key usage. 2016.07.24 18:20:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:20:35 - OpenVPN > VERIFY KU OK. 2016.07.24 18:20:35 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:20:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:20:35 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:20:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:20:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:20:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:20:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:20:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443. 2016.07.24 18:20:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:20:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.187 255.255.0.0'. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:20:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:20:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:20:38 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:20:38 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:20:38 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:20:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.187/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:20:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.187/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:20:38 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:20:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:43 - Starting Management Interface. 2016.07.24 18:20:43 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:20:43 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:20:43 - Disconnecting. 2016.07.24 18:20:43 - Management - Send 'signal SIGTERM'. 2016.07.24 18:20:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:20:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:20:43 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.9 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:20:48 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:20:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:20:48 - Connection terminated.I 2016.07.24 18:20:48 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:20:51 - Checking authorization ...! 2016.07.24 18:20:51 - Connecting to Alrami (Sweden, Uppsala). 2016.07.24 18:20:51 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:20:51 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:20:51 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:20:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:20:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:20:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:51 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:20:51 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:20:51 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.145:443. 2016.07.24 18:20:51 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=2e47e915 f1ac9748. 2016.07.24 18:20:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:20:51 - OpenVPN > Validating certificate key usage. 2016.07.24 18:20:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:20:51 - OpenVPN > VERIFY KU OK. 2016.07.24 18:20:51 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:20:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:20:51 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:20:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:20:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:20:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:20:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:20:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:20:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443. 2016.07.24 18:20:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:20:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.129 255.255.0.0'. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:20:54 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:20:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:20:54 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:20:54 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:20:54 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:20:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.129/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:20:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.129/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:20:54 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:20:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:20:59 - Starting Management Interface. 2016.07.24 18:20:59 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:20:59 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:20:59 - Disconnecting. 2016.07.24 18:20:59 - Management - Send 'signal SIGTERM'. 2016.07.24 18:20:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:20:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:20:59 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.145 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:04 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:21:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:21:04 - Connection terminated.I 2016.07.24 18:21:04 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:21:07 - Checking authorization ...! 2016.07.24 18:21:07 - Connecting to Kajam (Netherlands, Alblasserdam). 2016.07.24 18:21:07 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:21:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:21:07 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:21:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:21:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:21:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:21:07 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:21:07 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.84:443. 2016.07.24 18:21:07 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.84:443, sid=cb1bff94 a24286ff. 2016.07.24 18:21:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:21:07 - OpenVPN > Validating certificate key usage. 2016.07.24 18:21:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:21:07 - OpenVPN > VERIFY KU OK. 2016.07.24 18:21:07 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:21:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:21:07 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:21:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:21:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:21:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.84:443. 2016.07.24 18:21:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:21:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.64 255.255.0.0'. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:21:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:21:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:21:10 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:21:10 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:21:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:21:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.64/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:21:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.64/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:21:10 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:21:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.84 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:16 - Starting Management Interface. 2016.07.24 18:21:16 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:21:16 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:21:16 - Disconnecting. 2016.07.24 18:21:16 - Management - Send 'signal SIGTERM'. 2016.07.24 18:21:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:21:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:21:16 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.84 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:21 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:21:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:21:21 - Connection terminated.I 2016.07.24 18:21:21 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:21:24 - Checking authorization ...! 2016.07.24 18:21:24 - Connecting to Altarf (Sweden, Uppsala). 2016.07.24 18:21:24 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:21:24 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:21:24 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:21:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:21:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:21:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:24 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:21:24 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:21:24 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.140:443. 2016.07.24 18:21:24 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=79154966 6c9f847f. 2016.07.24 18:21:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:21:25 - OpenVPN > Validating certificate key usage. 2016.07.24 18:21:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:21:25 - OpenVPN > VERIFY KU OK. 2016.07.24 18:21:25 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:21:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:21:25 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:21:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:21:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:21:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.140:443. 2016.07.24 18:21:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:21:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.190 255.255.0.0'. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:21:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:21:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:21:27 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:21:27 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:21:27 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:21:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.190/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:21:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:21:27 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:21:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.140 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:32 - Starting Management Interface. 2016.07.24 18:21:32 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:21:32 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:21:32 - Disconnecting. 2016.07.24 18:21:32 - Management - Send 'signal SIGTERM'. 2016.07.24 18:21:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:21:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:21:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.140 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:37 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:21:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:21:37 - Connection terminated.I 2016.07.24 18:21:37 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:21:40 - Checking authorization ...! 2016.07.24 18:21:40 - Connecting to Hatysa (Sweden, Uppsala). 2016.07.24 18:21:40 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:21:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:21:40 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:21:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:21:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:21:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:21:40 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:21:40 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443. 2016.07.24 18:21:40 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=4e05c2ad e89c5041. 2016.07.24 18:21:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:21:40 - OpenVPN > Validating certificate key usage. 2016.07.24 18:21:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:21:40 - OpenVPN > VERIFY KU OK. 2016.07.24 18:21:40 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:21:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:21:40 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:21:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:21:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:21:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.144:443. 2016.07.24 18:21:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:21:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.118 255.255.0.0'. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:21:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:21:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:21:43 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:21:43 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:21:43 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:21:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.118/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:21:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.118/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:21:43 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:21:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.144 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:21:48 - Starting Management Interface. 2016.07.24 18:21:48 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:21:48 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:21:48 - Disconnecting. 2016.07.24 18:21:48 - Management - Send 'signal SIGTERM'. 2016.07.24 18:21:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:21:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:21:48 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.144 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:21:53 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:21:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:21:53 - Connection terminated.I 2016.07.24 18:21:53 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:21:56 - Checking authorization ...! 2016.07.24 18:21:56 - Connecting to Algieba (Sweden, Uppsala). 2016.07.24 18:21:56 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:21:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:21:56 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:21:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:21:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:21:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:21:57 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:21:57 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.142:443. 2016.07.24 18:21:57 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=97ff7e9f c20505eb. 2016.07.24 18:21:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:21:57 - OpenVPN > Validating certificate key usage. 2016.07.24 18:21:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:21:57 - OpenVPN > VERIFY KU OK. 2016.07.24 18:21:57 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:21:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:21:57 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:21:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:21:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:21:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:21:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:21:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2016.07.24 18:21:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:21:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.82 255.255.0.0'. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:21:59 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:21:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:21:59 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:21:59 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:21:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:21:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.1.82/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:21:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.82/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:21:59 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:22:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:04 - Starting Management Interface. 2016.07.24 18:22:04 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:22:04 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:22:04 - Disconnecting. 2016.07.24 18:22:04 - Management - Send 'signal SIGTERM'. 2016.07.24 18:22:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:22:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:22:04 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:09 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:22:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:22:09 - Connection terminated.I 2016.07.24 18:22:09 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:22:12 - Checking authorization ...! 2016.07.24 18:22:12 - Connecting to Phaet (Netherlands, Alblasserdam). 2016.07.24 18:22:12 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:22:12 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:22:12 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:22:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:22:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:22:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:22:13 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:22:13 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.148:443. 2016.07.24 18:22:13 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.148:443, sid=1f9d0ae9 2b4919de. 2016.07.24 18:22:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:22:13 - OpenVPN > Validating certificate key usage. 2016.07.24 18:22:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:22:13 - OpenVPN > VERIFY KU OK. 2016.07.24 18:22:13 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:22:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:22:13 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:22:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:22:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:22:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:22:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:22:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.148:443. 2016.07.24 18:22:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:22:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.65.39 255.255.0.0'. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:22:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:22:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:22:15 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:22:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:22:15 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:22:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.65.39/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:22:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.65.39/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:22:15 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:22:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.148 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:20 - Starting Management Interface. 2016.07.24 18:22:20 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:22:20 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:22:20 - Disconnecting. 2016.07.24 18:22:20 - Management - Send 'signal SIGTERM'. 2016.07.24 18:22:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:22:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:22:20 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.148 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:26 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:22:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:22:26 - Connection terminated.I 2016.07.24 18:22:26 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:22:29 - Checking authorization ...! 2016.07.24 18:22:29 - Connecting to Menkab (Sweden, Uppsala). 2016.07.24 18:22:29 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:22:29 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:22:29 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:22:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:22:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:22:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:29 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:22:29 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:22:29 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.143:443. 2016.07.24 18:22:29 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=ec40e12d 9f3f95ce. 2016.07.24 18:22:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:22:29 - OpenVPN > Validating certificate key usage. 2016.07.24 18:22:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:22:29 - OpenVPN > VERIFY KU OK. 2016.07.24 18:22:29 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:22:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:22:29 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:22:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:22:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:22:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:22:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:22:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.143:443. 2016.07.24 18:22:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:22:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.132 255.255.0.0'. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:22:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:22:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:22:32 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:22:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:22:32 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:22:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.132/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:22:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:22:32 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:22:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.143 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:37 - Starting Management Interface. 2016.07.24 18:22:37 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:22:37 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:22:37 - Disconnecting. 2016.07.24 18:22:37 - Management - Send 'signal SIGTERM'. 2016.07.24 18:22:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:22:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:22:37 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.143 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:42 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:22:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:22:42 - Connection terminated.I 2016.07.24 18:22:42 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:22:45 - Checking authorization ...! 2016.07.24 18:22:45 - Connecting to Alphecca (Netherlands, Alblasserdam). 2016.07.24 18:22:45 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:22:45 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:22:45 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:22:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:22:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:22:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:45 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:22:45 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:22:45 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.4:443. 2016.07.24 18:22:45 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=5355732f 616cff46. 2016.07.24 18:22:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:22:45 - OpenVPN > Validating certificate key usage. 2016.07.24 18:22:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:22:45 - OpenVPN > VERIFY KU OK. 2016.07.24 18:22:45 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:22:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:22:45 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:22:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:22:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:22:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:22:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:22:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:22:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443. 2016.07.24 18:22:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:22:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.73 255.255.0.0'. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:22:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:22:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:22:48 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:22:48 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:22:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:22:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.73/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:22:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.73/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:22:48 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:22:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.4 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:22:53 - Starting Management Interface. 2016.07.24 18:22:53 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:22:53 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:22:53 - Disconnecting. 2016.07.24 18:22:53 - Management - Send 'signal SIGTERM'. 2016.07.24 18:22:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:22:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:22:53 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.4 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:22:58 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:22:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:22:58 - Connection terminated.I 2016.07.24 18:22:58 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:23:01 - Checking authorization ...! 2016.07.24 18:23:02 - Connecting to Gomeisa (Sweden, Uppsala). 2016.07.24 18:23:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:23:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:23:02 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:23:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:23:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:23:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:23:02 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:23:02 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.132:443. 2016.07.24 18:23:02 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=d51a70a7 a2362533. 2016.07.24 18:23:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:23:02 - OpenVPN > Validating certificate key usage. 2016.07.24 18:23:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:23:02 - OpenVPN > VERIFY KU OK. 2016.07.24 18:23:02 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:23:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:23:02 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:23:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:23:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:23:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.132:443. 2016.07.24 18:23:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:23:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.38.236 255.255.0.0'. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:23:04 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:23:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:23:04 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:23:04 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:23:04 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:23:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.38.236/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:23:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.38.236/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:23:04 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:23:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.132 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:09 - Starting Management Interface. 2016.07.24 18:23:09 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:23:09 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:23:09 - Disconnecting. 2016.07.24 18:23:09 - Management - Send 'signal SIGTERM'. 2016.07.24 18:23:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:23:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:23:09 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.132 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:14 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:23:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:23:14 - Connection terminated.I 2016.07.24 18:23:14 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:23:17 - Checking authorization ...! 2016.07.24 18:23:17 - Connecting to Ancha (Netherlands, Alblasserdam). 2016.07.24 18:23:17 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:23:17 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:23:17 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:23:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:23:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:23:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:17 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:23:17 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:23:17 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.164:443. 2016.07.24 18:23:17 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=fff50348 39acebca. 2016.07.24 18:23:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:23:17 - OpenVPN > Validating certificate key usage. 2016.07.24 18:23:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:23:17 - OpenVPN > VERIFY KU OK. 2016.07.24 18:23:17 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:23:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:23:17 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:23:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:23:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:23:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443. 2016.07.24 18:23:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:23:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.141 255.255.0.0'. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:23:20 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:23:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:23:20 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:23:20 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:23:20 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:23:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.141/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:23:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.141/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:23:20 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:23:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.164 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:25 - Starting Management Interface. 2016.07.24 18:23:25 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:23:25 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:23:25 - Disconnecting. 2016.07.24 18:23:25 - Management - Send 'signal SIGTERM'. 2016.07.24 18:23:25 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:23:25 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:23:25 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.164 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:30 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:23:30 - Connection terminated.. 2016.07.24 18:23:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2016.07.24 18:23:30 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:23:33 - Checking authorization ...! 2016.07.24 18:23:34 - Connecting to Atria (Sweden, Uppsala). 2016.07.24 18:23:34 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:23:34 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:23:34 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:23:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:23:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:23:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:34 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:23:34 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:23:34 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443. 2016.07.24 18:23:34 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=8df69e63 1ced5690. 2016.07.24 18:23:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:23:34 - OpenVPN > Validating certificate key usage. 2016.07.24 18:23:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:23:34 - OpenVPN > VERIFY KU OK. 2016.07.24 18:23:34 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:23:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:23:34 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:23:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:23:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:23:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443. 2016.07.24 18:23:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:23:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.32 255.255.0.0'. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:23:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:23:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:23:36 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:23:36 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:23:36 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:23:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.32/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:23:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.32/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:23:36 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:23:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:41 - Starting Management Interface. 2016.07.24 18:23:41 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:23:41 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:23:41 - Disconnecting. 2016.07.24 18:23:41 - Management - Send 'signal SIGTERM'. 2016.07.24 18:23:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:23:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:23:41 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:23:46 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:23:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:23:46 - Connection terminated.I 2016.07.24 18:23:46 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:23:49 - Checking authorization ...! 2016.07.24 18:23:49 - Connecting to Aquilae (Germany, Frankfurt). 2016.07.24 18:23:49 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:23:49 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:23:49 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:23:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:23:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:23:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:49 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:23:49 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:23:49 - OpenVPN > UDPv4 link remote: [AF_INET]46.165.208.70:443. 2016.07.24 18:23:49 - OpenVPN > TLS: Initial packet from [AF_INET]46.165.208.70:443, sid=983eb5f2 9da0d903. 2016.07.24 18:23:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:23:49 - OpenVPN > Validating certificate key usage. 2016.07.24 18:23:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:23:49 - OpenVPN > VERIFY KU OK. 2016.07.24 18:23:49 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:23:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:23:49 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:23:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:23:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:23:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:23:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:23:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.165.208.70:443. 2016.07.24 18:23:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:23:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.123 255.255.0.0'. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:23:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:23:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:23:52 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:23:52 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:23:52 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:23:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.21.123/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:23:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.21.123/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:23:52 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:23:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 46.165.208.70 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:23:57 - Starting Management Interface. 2016.07.24 18:23:57 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:23:57 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:23:57 - Disconnecting. 2016.07.24 18:23:57 - Management - Send 'signal SIGTERM'. 2016.07.24 18:23:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:23:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:23:57 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.165.208.70 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:24:02 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:24:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:24:02 - Connection terminated.I 2016.07.24 18:24:02 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:24:05 - Checking authorization ...! 2016.07.24 18:24:05 - Connecting to Muphrid (Sweden, Uppsala). 2016.07.24 18:24:05 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:24:05 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:24:05 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:24:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:24:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:24:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:24:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:24:05 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:24:05 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:24:05 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443. 2016.07.24 18:24:05 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=31e78eb3 40e65ab5. 2016.07.24 18:24:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:24:05 - OpenVPN > Validating certificate key usage. 2016.07.24 18:24:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:24:05 - OpenVPN > VERIFY KU OK. 2016.07.24 18:24:05 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:24:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:24:05 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:24:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:24:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:24:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:24:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:24:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:24:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:24:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443 After changing to WPF again: . 2016.07.24 18:25:28 - Management - Send 'signal SIGTERM'. 2016.07.24 18:25:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:25:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:25:28 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.147 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:25:33 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:25:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:25:33 - Connection terminated.I 2016.07.24 18:25:33 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:25:36 - Checking authorization ...! 2016.07.24 18:25:36 - Connecting to Gianfar (Netherlands, Alblasserdam). 2016.07.24 18:25:36 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:25:36 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:25:36 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:25:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:25:37 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:25:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:37 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:25:37 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:25:37 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.100:443. 2016.07.24 18:25:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.100:443, sid=e0b428c3 299a05cd. 2016.07.24 18:25:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:25:37 - OpenVPN > Validating certificate key usage. 2016.07.24 18:25:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:25:37 - OpenVPN > VERIFY KU OK. 2016.07.24 18:25:37 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:25:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:25:37 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:25:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:25:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:25:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:25:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:25:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.100:443. 2016.07.24 18:25:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:25:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.58.237 255.255.0.0'. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:25:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:25:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:25:39 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:25:39 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:25:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:25:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.58.237/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:25:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.58.237/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:25:39 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:25:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.100 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:25:44 - Starting Management Interface. 2016.07.24 18:25:44 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:25:44 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:25:44 - Disconnecting. 2016.07.24 18:25:44 - Management - Send 'signal SIGTERM'. 2016.07.24 18:25:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:25:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:25:44 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.100 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:25:49 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:25:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:25:49 - Connection terminated.I 2016.07.24 18:25:49 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:25:52 - Checking authorization ...! 2016.07.24 18:25:52 - Connecting to Situla (Netherlands, Alblasserdam). 2016.07.24 18:25:52 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:25:52 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:25:52 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:25:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:25:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:25:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:52 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:25:52 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:25:52 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443. 2016.07.24 18:25:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=d61f8a2a 8451263e. 2016.07.24 18:25:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:25:52 - OpenVPN > Validating certificate key usage. 2016.07.24 18:25:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:25:52 - OpenVPN > VERIFY KU OK. 2016.07.24 18:25:52 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:25:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:25:52 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:25:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:25:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:25:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:25:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:25:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:25:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443. 2016.07.24 18:25:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:25:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.9 255.255.0.0'. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:25:55 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:25:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:25:55 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:25:55 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:25:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:25:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.9/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:25:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.9/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:25:55 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:26:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.14 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:00 - Starting Management Interface. 2016.07.24 18:26:00 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:26:00 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:26:00 - Disconnecting. 2016.07.24 18:26:00 - Management - Send 'signal SIGTERM'. 2016.07.24 18:26:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:26:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:26:00 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.14 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:05 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:26:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:26:05 - Connection terminated.I 2016.07.24 18:26:05 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:26:08 - Checking authorization ...! 2016.07.24 18:26:08 - Connecting to Subra (Netherlands, Alblasserdam). 2016.07.24 18:26:08 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:26:08 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:26:08 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:26:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:26:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:26:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:08 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:26:08 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:26:08 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443. 2016.07.24 18:26:08 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=3d7ee063 59907970. 2016.07.24 18:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:26:09 - OpenVPN > Validating certificate key usage. 2016.07.24 18:26:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:26:09 - OpenVPN > VERIFY KU OK. 2016.07.24 18:26:09 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:26:09 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:26:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:26:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443. 2016.07.24 18:26:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:26:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.62.132 255.255.0.0'. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:26:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:26:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:26:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:26:11 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:26:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:26:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.62.132/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:26:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.62.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:26:11 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:26:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.98 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:16 - Starting Management Interface. 2016.07.24 18:26:16 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:26:16 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:26:16 - Disconnecting. 2016.07.24 18:26:16 - Management - Send 'signal SIGTERM'. 2016.07.24 18:26:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:26:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:26:16 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.98 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:21 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:26:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:26:21 - Connection terminated.I 2016.07.24 18:26:21 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:26:24 - Checking authorization ...! 2016.07.24 18:26:25 - Connecting to Sheliak (Netherlands, Alblasserdam). 2016.07.24 18:26:25 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:26:25 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:26:25 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:26:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:26:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:26:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:25 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:26:25 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:26:25 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443. 2016.07.24 18:26:25 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=10efcf5e b4499cd4. 2016.07.24 18:26:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:26:25 - OpenVPN > Validating certificate key usage. 2016.07.24 18:26:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:26:25 - OpenVPN > VERIFY KU OK. 2016.07.24 18:26:25 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:26:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:26:25 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:26:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:26:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:26:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443. 2016.07.24 18:26:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:26:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.63.139 255.255.0.0'. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:26:28 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:26:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:26:28 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:26:28 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:26:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:26:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.63.139/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:26:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.63.139/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:26:28 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:26:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:33 - Starting Management Interface. 2016.07.24 18:26:33 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:26:33 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:26:33 - Disconnecting. 2016.07.24 18:26:33 - Management - Send 'signal SIGTERM'. 2016.07.24 18:26:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:26:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:26:33 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:38 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:26:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:26:38 - Connection terminated.I 2016.07.24 18:26:38 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:26:41 - Checking authorization ...! 2016.07.24 18:26:41 - Connecting to Alrai (Netherlands, Alblasserdam). 2016.07.24 18:26:41 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:26:41 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:26:41 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:26:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:26:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:26:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:41 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:26:41 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:26:41 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.78:443. 2016.07.24 18:26:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.78:443, sid=3aaf076d 8ac56fbb. 2016.07.24 18:26:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:26:41 - OpenVPN > Validating certificate key usage. 2016.07.24 18:26:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:26:41 - OpenVPN > VERIFY KU OK. 2016.07.24 18:26:41 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:26:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:26:41 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:26:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:26:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:26:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.78:443. 2016.07.24 18:26:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:26:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.190 255.255.0.0'. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:26:44 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:26:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:26:44 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:26:44 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:26:44 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:26:44 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.190/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:26:44 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:26:44 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:26:49 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.78 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:26:49 - Starting Management Interface. 2016.07.24 18:26:49 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:26:49 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:26:49 - Disconnecting. 2016.07.24 18:26:49 - Management - Send 'signal SIGTERM'. 2016.07.24 18:26:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:26:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:26:49 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.78 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:26:54 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:26:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:26:54 - Connection terminated.I 2016.07.24 18:26:54 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:26:57 - Checking authorization ...! 2016.07.24 18:26:57 - Connecting to Marfic (France, Paris). 2016.07.24 18:26:57 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:26:57 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:26:57 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:26:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:26:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:26:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:26:57 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:26:57 - OpenVPN > UDPv4 link remote: [AF_INET]195.154.194.18:443. 2016.07.24 18:26:57 - OpenVPN > TLS: Initial packet from [AF_INET]195.154.194.18:443, sid=98f88da9 b9514889. 2016.07.24 18:26:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:26:57 - OpenVPN > Validating certificate key usage. 2016.07.24 18:26:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:26:57 - OpenVPN > VERIFY KU OK. 2016.07.24 18:26:57 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:26:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:26:57 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:26:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:26:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:26:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:26:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:26:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]195.154.194.18:443. 2016.07.24 18:27:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:27:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.216 255.255.0.0'. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:27:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:27:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:27:00 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:27:00 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:27:00 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:27:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.216/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:27:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.216/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:27:00 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:27:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 195.154.194.18 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:05 - Starting Management Interface. 2016.07.24 18:27:05 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:27:05 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:27:05 - Disconnecting. 2016.07.24 18:27:05 - Management - Send 'signal SIGTERM'. 2016.07.24 18:27:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:27:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:27:05 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 195.154.194.18 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:10 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:27:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:27:10 - Connection terminated.I 2016.07.24 18:27:10 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:27:13 - Checking authorization ...! 2016.07.24 18:27:13 - Connecting to Gienah (Netherlands, Alblasserdam). 2016.07.24 18:27:13 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:27:13 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:27:13 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:27:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:27:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:27:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:27:13 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:27:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443. 2016.07.24 18:27:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=63147a90 a8a9482b. 2016.07.24 18:27:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:27:13 - OpenVPN > Validating certificate key usage. 2016.07.24 18:27:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:27:13 - OpenVPN > VERIFY KU OK. 2016.07.24 18:27:13 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:27:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:27:13 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:27:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:27:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:27:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:27:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:27:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443. 2016.07.24 18:27:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:27:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.23 255.255.0.0'. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:27:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:27:16 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:27:16 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:27:16 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:27:16 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:27:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.23/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:27:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.23/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:27:16 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:27:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.93 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:21 - Starting Management Interface. 2016.07.24 18:27:21 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:27:21 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:27:21 - Disconnecting. 2016.07.24 18:27:21 - Management - Send 'signal SIGTERM'. 2016.07.24 18:27:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:27:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:27:21 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.93 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:26 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:27:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:27:26 - Connection terminated.I 2016.07.24 18:27:26 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:27:29 - Checking authorization ...! 2016.07.24 18:27:30 - Connecting to Skat (Netherlands, Alblasserdam). 2016.07.24 18:27:30 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:27:30 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:27:30 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:27:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:27:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:27:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:30 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:27:30 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:27:30 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.73:443. 2016.07.24 18:27:30 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.73:443, sid=fee449c8 6edbc995. 2016.07.24 18:27:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:27:30 - OpenVPN > Validating certificate key usage. 2016.07.24 18:27:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:27:30 - OpenVPN > VERIFY KU OK. 2016.07.24 18:27:30 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:27:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:27:30 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:27:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:27:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:27:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:27:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:27:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.73:443. 2016.07.24 18:27:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:27:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.242 255.255.0.0'. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:27:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:27:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:27:32 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:27:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:27:32 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:27:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.242/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:27:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.242/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:27:32 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:27:38 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.73 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:38 - Starting Management Interface. 2016.07.24 18:27:38 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:27:38 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:27:38 - Disconnecting. 2016.07.24 18:27:38 - Management - Send 'signal SIGTERM'. 2016.07.24 18:27:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:27:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:27:38 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.73 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:43 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:27:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:27:43 - Connection terminated.I 2016.07.24 18:27:43 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:27:46 - Checking authorization ...! 2016.07.24 18:27:46 - Connecting to Minkar (United Kingdom, Maidenhead). 2016.07.24 18:27:46 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:27:46 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:27:46 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:27:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:27:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:27:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:46 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:27:46 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:27:46 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.130:443. 2016.07.24 18:27:46 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.130:443, sid=055d3daf d9c73205. 2016.07.24 18:27:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:27:46 - OpenVPN > Validating certificate key usage. 2016.07.24 18:27:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:27:46 - OpenVPN > VERIFY KU OK. 2016.07.24 18:27:46 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:27:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:27:46 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:27:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:27:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:27:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:27:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:27:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:27:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.130:443. 2016.07.24 18:27:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:27:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.215 255.255.0.0'. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:27:49 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:27:49 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:27:49 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:27:49 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:27:49 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:27:49 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.215/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:27:49 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.215/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:27:49 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:27:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.130 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:27:54 - Starting Management Interface. 2016.07.24 18:27:54 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:27:54 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:27:54 - Disconnecting. 2016.07.24 18:27:54 - Management - Send 'signal SIGTERM'. 2016.07.24 18:27:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:27:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:27:54 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.130 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:27:59 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:27:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:27:59 - Connection terminated.I 2016.07.24 18:27:59 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:28:02 - Checking authorization ...! 2016.07.24 18:28:02 - Connecting to Matar (Netherlands, Alblasserdam). 2016.07.24 18:28:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:28:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:28:02 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:28:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:28:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:28:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:28:02 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:28:02 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.137:443. 2016.07.24 18:28:02 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.137:443, sid=7fa108fa 4652ecb8. 2016.07.24 18:28:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:28:02 - OpenVPN > Validating certificate key usage. 2016.07.24 18:28:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:28:02 - OpenVPN > VERIFY KU OK. 2016.07.24 18:28:02 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:28:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:28:02 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:28:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:28:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:28:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.137:443. 2016.07.24 18:28:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:28:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.25 255.255.0.0'. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:28:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:28:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:28:05 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:28:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:28:05 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:28:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.25/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:28:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.25/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:28:05 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:28:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.137 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:10 - Starting Management Interface. 2016.07.24 18:28:10 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:28:10 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:28:10 - Disconnecting. 2016.07.24 18:28:10 - Management - Send 'signal SIGTERM'. 2016.07.24 18:28:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:28:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:28:10 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.137 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:15 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:28:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:28:15 - Connection terminated.I 2016.07.24 18:28:15 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:28:18 - Checking authorization ...! 2016.07.24 18:28:18 - Connecting to Hyadum (Netherlands, Alblasserdam). 2016.07.24 18:28:18 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:28:18 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:28:18 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:28:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:28:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:28:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:18 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:28:18 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:28:18 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.34:443. 2016.07.24 18:28:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.34:443, sid=c7d25aa4 ae64e4b3. 2016.07.24 18:28:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:28:18 - OpenVPN > Validating certificate key usage. 2016.07.24 18:28:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:28:18 - OpenVPN > VERIFY KU OK. 2016.07.24 18:28:18 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:28:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:28:18 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:28:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:28:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:28:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.34:443. 2016.07.24 18:28:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:28:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.99 255.255.0.0'. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:28:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:28:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:28:21 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:28:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:28:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:28:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.99/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:28:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.99/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:28:21 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:28:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.34 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:26 - Starting Management Interface. 2016.07.24 18:28:26 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:28:26 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:28:26 - Disconnecting. 2016.07.24 18:28:26 - Management - Send 'signal SIGTERM'. 2016.07.24 18:28:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:28:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:28:26 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.34 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:31 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:28:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:28:31 - Connection terminated.I 2016.07.24 18:28:31 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:28:34 - Checking authorization ...! 2016.07.24 18:28:35 - Connecting to Miram (Netherlands, Alblasserdam). 2016.07.24 18:28:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:28:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:28:35 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:28:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:28:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:28:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:28:35 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:28:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2016.07.24 18:28:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=37de9d8a 237c9ec3. 2016.07.24 18:28:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:28:35 - OpenVPN > Validating certificate key usage. 2016.07.24 18:28:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:28:35 - OpenVPN > VERIFY KU OK. 2016.07.24 18:28:35 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:28:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:28:35 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:28:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:28:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:28:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2016.07.24 18:28:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:28:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.89 255.255.0.0'. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:28:37 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:28:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:28:37 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:28:37 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:28:37 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:28:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.89/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:28:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.89/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:28:37 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:28:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:43 - Starting Management Interface. 2016.07.24 18:28:43 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:28:43 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:28:43 - Disconnecting. 2016.07.24 18:28:43 - Management - Send 'signal SIGTERM'. 2016.07.24 18:28:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:28:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:28:43 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:28:48 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:28:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:28:48 - Connection terminated.I 2016.07.24 18:28:48 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:28:51 - Checking authorization ...! 2016.07.24 18:28:51 - Connecting to Albali (Sweden, Uppsala). 2016.07.24 18:28:51 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:28:51 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:28:51 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:28:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:28:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:28:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:51 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:28:51 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:28:51 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.149:443. 2016.07.24 18:28:51 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.149:443, sid=44b2e29b df70c45f. 2016.07.24 18:28:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:28:51 - OpenVPN > Validating certificate key usage. 2016.07.24 18:28:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:28:51 - OpenVPN > VERIFY KU OK. 2016.07.24 18:28:51 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:28:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:28:51 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:28:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:28:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:28:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:28:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:28:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.149:443. 2016.07.24 18:28:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:28:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.225 255.255.0.0'. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:28:54 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:28:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:28:54 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:28:54 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:28:54 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:28:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.225/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:28:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.225/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:28:54 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:28:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.149 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:28:59 - Starting Management Interface. 2016.07.24 18:28:59 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:28:59 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:28:59 - Disconnecting. 2016.07.24 18:28:59 - Management - Send 'signal SIGTERM'. 2016.07.24 18:28:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:28:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:28:59 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:28:59 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.149 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:29:04 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:29:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:29:04 - Connection terminated.I 2016.07.24 18:29:04 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:29:07 - Checking authorization ...! 2016.07.24 18:29:07 - Connecting to Pherkad (Sweden, Uppsala). 2016.07.24 18:29:07 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:29:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:29:07 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:29:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:29:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:29:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:29:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:29:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:29:07 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:29:07 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.134:443. 2016.07.24 18:29:07 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.134:443, sid=35cc3a59 7c93f73e. 2016.07.24 18:29:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:29:07 - OpenVPN > Validating certificate key usage. 2016.07.24 18:29:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:29:07 - OpenVPN > VERIFY KU OK. 2016.07.24 18:29:07 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:29:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:29:07 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:29:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:29:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:29:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:29:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:29:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:29:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:29:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.134:443. 2016.07.24 18:29:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:29:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.43.225 255.255.0.0'. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:29:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:29:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:29:10 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:29:10 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:29:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:29:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.43.225/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:29:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.43.225/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:29:10 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:29:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.134 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:29:15 - Starting Management Interface. 2016.07.24 18:29:15 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:29:15 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:29:15 - Disconnecting. 2016.07.24 18:29:15 - Management - Send 'signal SIGTERM'. 2016.07.24 18:29:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:29:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:29:15 - OpenVPN > SIGTERM received, sending exit notification to peer After resetting everything: I 2016.07.24 18:48:16 - Eddie client version: 2.11.2 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64. 2016.07.24 18:48:16 - Reading options from C:\Users\U1\AppData\Local\AirVPN\AirVPN.xml. 2016.07.24 18:48:16 - Data Path: C:\Users\U1\AppData\Local\AirVPN. 2016.07.24 18:48:16 - App Path: C:\Program Files\AirVPN. 2016.07.24 18:48:16 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.07.24 18:48:16 - Command line arguments (1): path="home". 2016.07.24 18:48:16 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1I 2016.07.24 18:48:18 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2016.07.24 18:48:18 - OpenVPN - Version: OpenVPN 2.3.11 (C:\Program Files\AirVPN\openvpn.exe)I 2016.07.24 18:48:18 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.07.24 18:48:18 - SSL - Version: stunnel 5.32 (C:\Program Files\AirVPN\stunnel.exe)W 2016.07.24 18:48:20 - Recovery. Unexpected crash?I 2016.07.24 18:48:20 - IPv6 restored with registry changes.! 2016.07.24 18:48:20 - Ready. 2016.07.24 18:48:20 - Updating systems & servers data .... 2016.07.24 18:48:21 - Systems & servers data update completedI 2016.07.24 18:48:23 - Session starting.I 2016.07.24 18:48:24 - IPv6 disabled with packet filtering.I 2016.07.24 18:48:24 - IPv6 disabled with registry changes.I 2016.07.24 18:48:24 - Checking authorization ...! 2016.07.24 18:48:24 - Connecting to Hatysa (Sweden, Uppsala). 2016.07.24 18:48:24 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:48:24 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:48:24 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:48:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:48:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:48:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:24 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:48:24 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:48:24 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443. 2016.07.24 18:48:24 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=b029ec2e da35a15f. 2016.07.24 18:48:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:48:24 - OpenVPN > Validating certificate key usage. 2016.07.24 18:48:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:48:24 - OpenVPN > VERIFY KU OK. 2016.07.24 18:48:24 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:48:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:48:24 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:48:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:48:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:48:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:48:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:48:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.144:443. 2016.07.24 18:48:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:48:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.118 255.255.0.0'. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:48:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:48:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:48:27 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:48:27 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:48:27 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:48:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.118/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:48:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.118/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:48:27 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:48:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.144 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:48:32 - Starting Management Interface. 2016.07.24 18:48:32 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:48:32 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:48:32 - Disconnecting. 2016.07.24 18:48:32 - Management - Send 'signal SIGTERM'. 2016.07.24 18:48:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:48:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:48:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.144 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:48:37 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:48:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:48:37 - Connection terminated.I 2016.07.24 18:48:37 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:48:40 - Checking authorization ...! 2016.07.24 18:48:40 - Connecting to Muphrid (Sweden, Uppsala). 2016.07.24 18:48:40 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:48:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:48:40 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:48:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:48:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:48:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:48:40 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:48:40 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443. 2016.07.24 18:48:40 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=5d0ea970 257b20fd. 2016.07.24 18:48:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:48:40 - OpenVPN > Validating certificate key usage. 2016.07.24 18:48:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:48:40 - OpenVPN > VERIFY KU OK. 2016.07.24 18:48:40 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:48:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:48:40 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:48:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:48:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:48:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:48:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:48:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443. 2016.07.24 18:48:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:48:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.31 255.255.0.0'. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:48:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:48:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:48:43 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:48:43 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:48:43 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:48:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.3.31/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:48:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.31/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:48:43 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:48:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.146 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:48:48 - Starting Management Interface. 2016.07.24 18:48:48 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:48:48 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:48:48 - Disconnecting. 2016.07.24 18:48:48 - Management - Send 'signal SIGTERM'. 2016.07.24 18:48:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:48:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:48:48 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.146 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:48:53 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:48:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:48:53 - Connection terminated.I 2016.07.24 18:48:53 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:48:56 - Checking authorization ...! 2016.07.24 18:48:56 - Connecting to Atria (Sweden, Uppsala). 2016.07.24 18:48:56 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:48:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:48:56 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:48:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:48:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:48:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:56 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:48:56 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:48:56 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443. 2016.07.24 18:48:56 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=0a23cbb1 88a9c2ef. 2016.07.24 18:48:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:48:56 - OpenVPN > Validating certificate key usage. 2016.07.24 18:48:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:48:56 - OpenVPN > VERIFY KU OK. 2016.07.24 18:48:56 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:48:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:48:56 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:48:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:48:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:48:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:48:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:48:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:48:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443. 2016.07.24 18:48:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:48:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.32 255.255.0.0'. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:48:59 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:48:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:48:59 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:48:59 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:48:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:48:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.32/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:48:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.32/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:48:59 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:49:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:04 - Starting Management Interface. 2016.07.24 18:49:04 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:49:04 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:49:04 - Disconnecting. 2016.07.24 18:49:04 - Management - Send 'signal SIGTERM'. 2016.07.24 18:49:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:49:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:49:04 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:09 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:49:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:49:09 - Connection terminated.I 2016.07.24 18:49:09 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:49:12 - Checking authorization ...! 2016.07.24 18:49:12 - Connecting to Serpentis (Sweden, Uppsala). 2016.07.24 18:49:13 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:49:13 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:49:13 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:49:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:49:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:49:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:49:13 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:49:13 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.139:443. 2016.07.24 18:49:13 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.139:443, sid=20ed0f0d 3bcef95f. 2016.07.24 18:49:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:49:13 - OpenVPN > Validating certificate key usage. 2016.07.24 18:49:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:49:13 - OpenVPN > VERIFY KU OK. 2016.07.24 18:49:13 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:49:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:49:13 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:49:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:49:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:49:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:49:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:49:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.139:443. 2016.07.24 18:49:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:49:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.14 255.255.0.0'. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:49:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:49:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:49:15 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:49:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:49:15 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:49:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.16.14/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:49:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.16.14/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:49:15 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:49:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.139 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:20 - Starting Management Interface. 2016.07.24 18:49:20 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:49:20 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:49:20 - Disconnecting. 2016.07.24 18:49:20 - Management - Send 'signal SIGTERM'. 2016.07.24 18:49:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:49:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:49:20 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.139 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:26 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:49:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:49:26 - Connection terminated.I 2016.07.24 18:49:26 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:49:29 - Checking authorization ...! 2016.07.24 18:49:29 - Connecting to Alrami (Sweden, Uppsala). 2016.07.24 18:49:29 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:49:29 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:49:29 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:49:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:49:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:49:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:29 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:49:29 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:49:29 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.145:443. 2016.07.24 18:49:29 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=a0de33bd 3bd114d3. 2016.07.24 18:49:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:49:29 - OpenVPN > Validating certificate key usage. 2016.07.24 18:49:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:49:29 - OpenVPN > VERIFY KU OK. 2016.07.24 18:49:29 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:49:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:49:29 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:49:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:49:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:49:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:49:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:49:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443. 2016.07.24 18:49:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:49:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.129 255.255.0.0'. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:49:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:49:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:49:32 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:49:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:49:32 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:49:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.129/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:49:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.129/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:49:32 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:49:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:37 - Starting Management Interface. 2016.07.24 18:49:37 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:49:37 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:49:37 - Disconnecting. 2016.07.24 18:49:37 - Management - Send 'signal SIGTERM'. 2016.07.24 18:49:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:49:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:49:37 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.145 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:42 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:49:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:49:42 - Connection terminated.I 2016.07.24 18:49:42 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:49:46 - Checking authorization ...! 2016.07.24 18:49:46 - Connecting to Menkab (Sweden, Uppsala). 2016.07.24 18:49:46 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:49:46 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:49:46 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:49:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:49:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:49:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:46 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:49:46 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:49:46 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.143:443. 2016.07.24 18:49:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=431f463c 20327492. 2016.07.24 18:49:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:49:46 - OpenVPN > Validating certificate key usage. 2016.07.24 18:49:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:49:46 - OpenVPN > VERIFY KU OK. 2016.07.24 18:49:46 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:49:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:49:46 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:49:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:49:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:49:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:49:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:49:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:49:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.143:443. 2016.07.24 18:49:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:49:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.132 255.255.0.0'. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:49:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:49:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:49:48 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:49:48 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:49:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:49:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.132/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:49:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:49:48 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:49:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.143 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:49:53 - Starting Management Interface. 2016.07.24 18:49:53 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:49:53 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:49:53 - Disconnecting. 2016.07.24 18:49:53 - Management - Send 'signal SIGTERM'. 2016.07.24 18:49:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:49:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:49:53 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.143 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:49:58 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:49:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:49:58 - Connection terminated.I 2016.07.24 18:49:58 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:50:01 - Checking authorization ...! 2016.07.24 18:50:02 - Connecting to Talitha (Netherlands, Alblasserdam). 2016.07.24 18:50:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:50:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:50:02 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:50:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:50:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:50:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:50:02 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:50:02 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.137:443. 2016.07.24 18:50:02 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.137:443, sid=0a201ab1 82422541. 2016.07.24 18:50:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:50:02 - OpenVPN > Validating certificate key usage. 2016.07.24 18:50:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:50:02 - OpenVPN > VERIFY KU OK. 2016.07.24 18:50:02 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:50:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:50:02 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:50:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:50:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:50:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.137:443. 2016.07.24 18:50:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:50:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.202 255.255.0.0'. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:50:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:50:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:50:05 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:50:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:50:05 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:50:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.202/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:50:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.202/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:50:05 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:50:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.137 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:10 - Starting Management Interface. 2016.07.24 18:50:10 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:50:10 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:50:10 - Disconnecting. 2016.07.24 18:50:10 - Management - Send 'signal SIGTERM'. 2016.07.24 18:50:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:50:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:50:10 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.137 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:15 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:50:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:50:15 - Connection terminated.I 2016.07.24 18:50:15 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:50:18 - Checking authorization ...! 2016.07.24 18:50:18 - Connecting to Alula (Sweden, Uppsala). 2016.07.24 18:50:18 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:50:18 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:50:18 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:50:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:50:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:50:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:18 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:50:18 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:50:18 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.151:443. 2016.07.24 18:50:18 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.151:443, sid=e0da2a96 5a9581a6. 2016.07.24 18:50:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:50:18 - OpenVPN > Validating certificate key usage. 2016.07.24 18:50:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:50:18 - OpenVPN > VERIFY KU OK. 2016.07.24 18:50:18 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:50:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:50:18 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:50:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:50:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:50:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.151:443. 2016.07.24 18:50:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:50:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.105 255.255.0.0'. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:50:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:50:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:50:21 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:50:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:50:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:50:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.105/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:50:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.105/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:50:21 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:50:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.151 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:26 - Starting Management Interface. 2016.07.24 18:50:26 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:50:26 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:50:26 - Disconnecting. 2016.07.24 18:50:26 - Management - Send 'signal SIGTERM'. 2016.07.24 18:50:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:50:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:50:26 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.151 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:31 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:50:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:50:31 - Connection terminated.I 2016.07.24 18:50:31 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:50:34 - Checking authorization ...! 2016.07.24 18:50:35 - Connecting to Altarf (Sweden, Uppsala). 2016.07.24 18:50:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:50:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:50:35 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:50:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:50:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:50:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:50:35 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:50:35 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.140:443. 2016.07.24 18:50:35 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=875daa1e f2b5dd04. 2016.07.24 18:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:50:35 - OpenVPN > Validating certificate key usage. 2016.07.24 18:50:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:50:35 - OpenVPN > VERIFY KU OK. 2016.07.24 18:50:35 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:50:35 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:50:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.140:443. 2016.07.24 18:50:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:50:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.190 255.255.0.0'. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:50:37 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:50:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:50:37 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:50:37 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:50:37 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:50:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.190/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:50:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:50:37 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}. 2016.07.24 18:50:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.140 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.07.24 18:50:42 - Starting Management Interface. 2016.07.24 18:50:42 - OpenVPN > Initialization Sequence CompletedW 2016.07.24 18:50:42 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'! 2016.07.24 18:50:42 - Disconnecting. 2016.07.24 18:50:42 - Management - Send 'signal SIGTERM'. 2016.07.24 18:50:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.07.24 18:50:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.07.24 18:50:42 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.140 MASK 255.255.255.255 192.168.1.1. 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.07.24 18:50:47 - OpenVPN > Closing TUN/TAP interface. 2016.07.24 18:50:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.07.24 18:50:47 - Connection terminated.I 2016.07.24 18:50:47 - DNS leak protection with packet filtering disabled.I 2016.07.24 18:50:50 - Checking authorization ...! 2016.07.24 18:50:50 - Connecting to Hassaleh (Netherlands, Alblasserdam). 2016.07.24 18:50:50 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016. 2016.07.24 18:50:50 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2016.07.24 18:50:50 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09. 2016.07.24 18:50:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.07.24 18:50:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.07.24 18:50:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:50 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2016.07.24 18:50:50 - OpenVPN > UDPv4 link local: [undef]. 2016.07.24 18:50:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.39:443. 2016.07.24 18:50:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.39:443, sid=587dfb98 d170be2d. 2016.07.24 18:50:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.24 18:50:50 - OpenVPN > Validating certificate key usage. 2016.07.24 18:50:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.24 18:50:50 - OpenVPN > VERIFY KU OK. 2016.07.24 18:50:50 - OpenVPN > Validating certificate extended key usage. 2016.07.24 18:50:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.24 18:50:50 - OpenVPN > VERIFY EKU OK. 2016.07.24 18:50:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.24 18:50:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.24 18:50:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.24 18:50:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.24 18:50:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.39:443. 2016.07.24 18:50:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.07.24 18:50:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.138 255.255.0.0'. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.07.24 18:50:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b. 2016.07.24 18:50:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.07.24 18:50:53 - OpenVPN > open_tun, tt->ipv6=0. 2016.07.24 18:50:53 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap. 2016.07.24 18:50:53 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.07.24 18:50:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.138/255.255.0.0 [sUCCEEDED]. 2016.07.24 18:50:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.138/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.07.24 18:50:53 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} Feel free to tell me if there's more information I can provide #datalove EDIT: Doesn't work on Admin account either now. EDIT 2: There's a popup when it crashes, which reads: AirVPNUnexpected error. Please contact our support staff. -Unexpected: NetLock WFP rule doesn't exists - atEddie.Platforms.NetworkLockWfp.RemoveRule(String code)at Eddie.Core.InterfaceScope.End()at Eddie.Core.InterfaceScope.Finalize() I hope this helps Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
LZ1 672 Posted ... @LZ1 Network Lock is "not active" if Eddie is not running, unless it crashed. When you shut down the software, previous firewall rules (or WFP settings) are restored. This is precisely consistent on all system and with all previous Eddie versions, nothing has changed. Sockets buffers size are set on system defaults on all OS, except in Windows, where the size picked by the system is not acceptable (too small). See the changelog. The menu button is lighted off. When the mouse pointer slides over it turns on. Kind regards Mmm, maybe I was unclear. I'm used to not being able to go online, until Eddie has started (we're talking about on system startup) and I assume this is due to NL. Since if Eddie doesn't start, then I can't go online, which I'm happy with. Does this make sense? Also, I wasn't being clear, I just meant to state it as a preference that I don't like the logo being greyed out and only highlighting on mouse-over, haha. Just in case, you know, Clodo is looking for design opinions! Hahaha. Thank you for replying so quickly. In case you didn't see it, I added another Edit to my "Report" post. Have a nice day Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
Staff 9972 Posted ... Mmm, maybe I was unclear. I'm used to not being able to go online, until Eddie has started (we're talking about on system startup) and I assume this is due to NL. Since if Eddie doesn't start, then I can't go online, which I'm happy with. Does this make sense? Hello! Understood and we repeat that it's not how Network Lock is expected to work. Is this happening with Eddie 2.11.2, or did you have this behavior on Eddie 2.10.3 as well? Kind regards Share this post Link to post
LZ1 672 Posted ... 2.10.3 and that was on both Windows 8 64-bit & 7 64-bit I think. I also just got 2.11.2 to connect again, on the Admin account, after many restarts.Edit: I should add this is all happening of Home Editions of both OS's. Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
Staff 9972 Posted ... 2.10.3 and that was on both Windows 8 64-bit & 7 64-bit I think. Good, so it should be some other problem, not a specific regression of 2.11.2 (good for 2.11.2 we mean!). Maybe it's just a DNS issue, unrelated to Network Lock, that you have since you used Eddie 2.10.3 (it had a bug for which under peculiar circumstances it did not restore properly previous DNS settings in Windows interfaces). So a plausible explanation is that you have the impression you have no connectivity, but in reality you have it. It's only that the system can't resolve names. Kind regards Share this post Link to post
LZ1 672 Posted ... 2.10.3 and that was on both Windows 8 64-bit & 7 64-bit I think. Good, so it should be some other problem, not a specific regression of 2.11.2 (good for 2.11.2 we mean!). Maybe it's just a DNS issue, unrelated to Network Lock, that you have since you used Eddie 2.10.3 (it had a bug for which under peculiar circumstances it did not restore properly previous DNS settings in Windows interfaces). So a plausible explanation is that you have the impression you have no connectivity, but in reality you have it. It's only that the system can't resolve names. Kind regardsThat is quite possible . I thought it was a feature, not a bug though, so I'm a happy customer ("network lock really works!!") lol. If I tried recreating the scenario and then pinged a website and got a response, would that prove it's probably a DNS issue, if I otherwise can't access websites? Please feel free to tell me if there's any other pieces of information I can add to this or my "Report" post. I'll try out 2.11.2 on Windows 8 as well, eventually. Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
andeby 7 Posted ... That is quite possible . I thought it was a feature, not a bug though, so I'm a happy customer ("network lock really works!!") lol. If I tried recreating the scenario and then pinged a website and got a response, would that prove it's probably a DNS issue, if I otherwise can't access websites? Please feel free to tell me if there's any other pieces of information I can add to this or my "Report" post. I'll try out 2.11.2 on Windows 8 as well, eventually. If you can ping a website's IP but not their domain name then it's the DNS issue. You can also just check your adapter's IPv4 settings, it will be stuck on AirVPN's DNS settings when it should be set to auto (or whatever you had there before). With the DNS issue other services are usually able to connect as well (iirc Steam, Spotify, Skype and services like that still work just fine). 1 LZ1 reacted to this Share this post Link to post
vpro_ 0 Posted ... Still can't download the windows version for the beta. @vpro_ Windows XP 64-bit .exe Installer: https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_installer.exe Windows XP 64-bit .zip Portable: https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_portable.zip Windows Vista / 7 64-bit .exe Installer: https://airvpn.org/repository/experimental/airvpn_windows_x64_installer.exe Windows Vista / 7 64-bit .zip Portable: https://airvpn.org/repository/experimental/airvpn_windows_x64_portable.zip Windows 8, 8.1, 10 64-bit .exe Installer: https://airvpn.org/repository/experimental/airvpn_windows8_x64_installer.exe Windows 8, 8.1, 10 64-bit .zip Portable: https://airvpn.org/repository/experimental/airvpn_windows8_x64_portable.zip -Uncle Hunto still says 2.10.3 after install Share this post Link to post
Keksjdjdke 35 Posted ... Feature request.Add the airvpn exit ip and server name onto MacOS menu bar next to the airvpn icon. this feature could be enabled and disabled from eddie's settings. Share this post Link to post
UncleHunto 6 Posted ... still says 2.10.3 after install @vpro_That's odd, it sounds like other people posting in this thread have been able to successfully download the new beta versions for Windows. Which Windows version (XP, Vista/7, 8/10) are you trying to install? Which AirVPN version (.exe Installer, .zip portable) are you trying to install? Have you tried checking the hash of version you are trying to install against it's hashes on the website, in order to confirm you have downloaded the correct version? How to check hashes: https://airvpn.org/faq/software_signatures/ Hashes for eddie 64 bit 2.11.2 beta: Windows XP 64 bit Windows XP 64 bit .exe Installerhttps://airvpn.org/repository/experimental/airvpn_windows_xp_x64_installer.exeMD5: bd38b099b54f68b62e6d3078fb6fa014SHA1: a63f65e28299073e22131b94899ba097d842c0f3SHA256: 059f02809aafbd4a847b8d95b3f5045a19c01d6048a47f99469eb9143e5f9e94SHA512: 0b0931ff6bb375671c07349b15fc7c5cf16f3b853bc547dda478973c5e454e672f785fe09d8d5322b94a5937e7556611ce158787375068c442b8749e6d6fc2e6 Windows XP 64 bit .zip Portablehttps://airvpn.org/repository/experimental/airvpn_windows_xp_x64_portable.zipMD5: d48434efffab71315c03b265ff52501cSHA1: 592b2161f2c6af89376f1802e5d99b71bce8cc74SHA256: a8adf87805fdd4f7f8a6da9125b421312c3ad98f576e5557df0363a06f5b42d4SHA512: 4d969587c83f6b78e190e051342b7a74e44d3290a445531dc2a1bd1f2f121572ba6fdcab4df88c863259024691da79af0a3a926b95cadbfc34c972839cfa69aa Windows Vista/7 64 bit Windows Vista/7 64 bit .exe Installerhttps://airvpn.org/repository/experimental/airvpn_windows_x64_installer.exeMD5: 4ebb09978a25366d04af9c6294f8d34eSHA1: 5fb3588f37630b9b2e49c378e43ce6dffedb7788SHA256: 40071b4ab5f8762414d606fbed8823d91d84a522b54818188c02e3d4407cf282SHA512: 1cc88aa2dcebf325c2083151b3163b0414dd920248b184470f9b01d3a2f0c378208e9f3921aede035e8ece883565d52d8068257387cbab251b8240824ad462bd Windows Vista/7 64 bit .zip Portablehttps://airvpn.org/repository/experimental/airvpn_windows_x64_portable.zipMD5: 42d586d66e560f55b7172c55e75633ebSHA1: 717b150f1135298b851d8f066814ef5eb68999cbSHA256: 8e189f127990b331598dc37c8425b071e92adc6e846616ae4e7a2d8f424f2d92SHA512: 8999cce055ab096fa50b0f78759455441e70f94c66fddc995e4b55dd8d6a4e5afef3528eeaecfdf50fce902f8041252a44ff666eacc3d9378c51c21caa79d8b5 Windows 8/8.1/10 64 bit Windows 8/8.1/10 64 bit .exe Installerhttps://airvpn.org/repository/experimental/airvpn_windows8_x64_installer.exeMD5: 8a8a320f9bb99dbd3e86683b8c5c2be7SHA1: 992cc60d732811ddc95aa5c95944438866b3dc74SHA256: 62531c44265e57f2a3bba38e8d44f48bdee65a511b448b15c60231bb2617549bSHA512: e0189fde0c4564f72b0c04c0782b8822791a9fb8d188e61e806df385c757fa8789c1e7ccf7f627a7902dba5ecd02ec68da6ed4dce2d3c886f4be81feb7d5b651 Windows 8/8.1/10 64 bit .zip Portablehttps://airvpn.org/repository/experimental/airvpn_windows8_x64_portable.zipMD5: f25f3eb818896b2b02230c5c15ac9132SHA1: 2c5293745868f49c07c77b62b2e6f208c0af76f0SHA256: 20692b071a2ca3afef58e7ca337f60863358fa62add70aad55fda7ddfb07c107SHA512: 639a181210795dd7f9ab4dd65d2bb28ce20d66f25ef46b4d7de6b9755aeb08c2935bc8b298981dc3fb581122f3141052f47d4c736e6abe6cc29a742f841b7500 -Uncle Hunto 1 bnrrteterstnjrsj45 reacted to this Share this post Link to post
Keksjdjdke 35 Posted ... I can only download the beta when connected to the vpn. When I'm not connected to the vpn I get the stable version and not 2.11.2. Share this post Link to post
RidersoftheStorm 20 Posted ... eddie 2.11.2 up and running good, so far. (win 7 64) I have to check the network lock. Share this post Link to post
CVjP7dXlHH 1 Posted ... i also had the issue with the page only downloading the stable version. here is what i did to solve it: 1. made sure airvpn.org was allowed in noscript2. clicked on other versions3. clicked on experimental4. selected the 32 bit version even though i want the 64 bit version5. clicked back on the 64 bit version6. hit the download button maybe that will help Share this post Link to post
Keksjdjdke 35 Posted ... I've tried to clear my cookies/cache before downloading, this seem to fix the problem on OS X. Share this post Link to post
UncleHunto 6 Posted ... Someone having problems with getting the new beta version to show up in their browser could also try opening the page in an incognito/private window, which should load the page without using any previously cached content, thus loading the most recent version. Share this post Link to post
Staff 9972 Posted ... Wow, the new version 2.11.2 not working on my windows, keep restarting the previous 2.11 working Windows WFP, Add rule failed: Unknown interface ID Previous 2.11 was working because the old beta used Windows Firewall by default, the new beta use another new method (WFP). You have an unexpected situation, Eddie doesn't always detect TAP ID to inform WFP to allow the network in NL mode.This is the issue of @internet_user, LZ1, and andeby.We are looking for a solution, but at the moment it doesn't occur on any of our lab machines. Feature request.Add the airvpn exit ip and server name onto MacOS menu bar next to the airvpn icon. this feature could be enabled and disabled from eddie settings. Ok, it will be done in the next build. I noticed that even though Internet Explorer isn't my default browser, Eddie still opens it when you go to the settings in the top left corner and click things such as "Speed Test (Web)". whenever you click a link in the client. It would be nice if it would open it in the default browser :]. Eddie opens link in the default browser. Does anyone else have this issue? I'm pretty sure I read that this client would now make the send & receive buffer sizes 256kb by default. If so, why is it set to "OpenVPN default"? It's on "Automatic" by default... Maybe the tab should be named Proxy/Tor instead Sounds good. Kind regards Share this post Link to post
LBDude 3 Posted ... Eddie Beta version 2.11.2 is working with Fedora 24. 1 Staff reacted to this Share this post Link to post
andeby 7 Posted ... Would like to report that since I updated to 2.11.2 my torrent speeds seem to be more stable at higher speeds than before (fluctuating between 2-6MB/s on 2.10.3 vs very stable at 6-7MB/s on 2.11.2 RC). I am still on the old 9.0.0.9 TAP-driver on Windows 7 x64. Could this be because of OpenVPN updates? I can also report that the weblinks in Eddie open in Chrome for me, working as intended. Share this post Link to post
Staff 9972 Posted ... Hello!To those who have the issue about a message like Unknown interface IDor Unexpected: NetLock WFP rule doesn't exists(andeby, internet_user, LZ1)Please edit your network interface (Control Panel\Network and Internet\Network Connections)and re-enable the "Internet Protocol Version 6 (TCP/IPv6)" checkbox.Don't worry, Eddie implements IPv6 lock.And de-check the flag "Disable IPv6 at OS level if requested" under Settings -> Advanced.It's still a bug that prevents usage with IPv6 disabled, it will be fixed soon. Kind regards 3 bnrrteterstnjrsj45, LZ1 and andeby reacted to this Share this post Link to post
andeby 7 Posted ... Sadly still getting the same error as before even after doing what you suggested. I also tried both with and without IPv6 allowed on the TAP-adapter which made no difference either. Share this post Link to post
LZ1 672 Posted ... Sadly still getting the same error as before even after doing what you suggested. I also tried both with and without IPv6 allowed on the TAP-adapter which made no difference either.Try go to Preferences>Advanced>Uncheck "WPF", click save and then click the Eddie Menu again, where Preferences are and click "Exit". Then restart and see if it works ^^. Because Staffs (kind) suggestion, didn't work for me either, but this did, after I played around with it. 2 andeby and internet_user reacted to this Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
andeby 7 Posted ... Although I already did have WFP unchecked, clicking Exit and restarting seems to have fixed it. WFP is now working for me as well, thanks! @Staff what exactly does unchecking WFP do/change? Is WFP network lock still in effect if WFP is unchecked? Share this post Link to post
LZ1 672 Posted ... ^__^ No worries. Thanks to the always hard working Clodo and Air Staff too, even though I'm sure the problem isn't entirely fixed just yet Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
LZ1 672 Posted ... Although I already did have WFP unchecked, clicking Exit and restarting seems to have fixed it. WFP is now working for me as well, thanks! @Staff what exactly does unchecking WFP do/change? Is WFP network lock still in effect if WFP is unchecked?I would assume NL is still on. Now I*m not an expert or anything... But I would assume that if something went wrong with WPF, then NL would switch to using Windows Firewall, as it appears to have done now. I just turned NL on and it works. No errors. Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post