Jump to content
Not connected, Your IP: 3.236.13.53
Staff

Eddie 2.11beta available

Recommended Posts

@LZ1

 

Network Lock is "not active" if Eddie is not running, unless it crashed. When you shut down the software, previous firewall rules (or WFP settings) are restored. This is precisely consistent on all system and with all previous Eddie versions, nothing has changed.

 

Sockets buffers size are set on system defaults on all OS, except in Windows, where the size picked by the system is not acceptable (too small). See the changelog.

 

The menu button is lighted off. When the mouse pointer slides over it turns on.

 

Kind regards

Share this post


Link to post

Report

 

TL;DR:

I currently can't connect to a server at all, under a Standard account, ever since I tried Eddie on an Admin account.

Tried setting Eddie to connect at startup & Windows startup, as well as to enable NL at startup. Eddie then doesn't start under a Standard account and browsing
is possible, without protection, even when Network Lock was on previously and set to connect automatically, from the last session.
However it starts up fine under an Admin account. After closing down the Admin account, restarting and then going back to a Standard account, Eddie won't start, but
instead crashes by continously throwing an exception. This can be stopped if the reconnection attempts are cancelled

 

Clean install of Win 7 64-bit.

Client version: 2.11.2

. Here's the exception:

Problem signature:
  Problem Event Name:    CLR20r3
  Problem Signature 01:    airvpn.exe
  Problem Signature 02:    2.11.0.0
  Problem Signature 03:    5793ef20
  Problem Signature 04:    Platforms.Windows
  Problem Signature 05:    2.11.0.0
  Problem Signature 06:    5793ef18
  Problem Signature 07:    c
  Problem Signature 08:    26
  Problem Signature 09:    System.Exception
  OS Version:    6.1.7601.2.1.0.768.3
  Locale ID:    2057

Attempts at changing the Network Lock firewall rule away from WPF to WF doesn't work, but Eddie stops crashing at least and instead tries to connect forever. Deactivating
NL doesn't make the crashes stop and it's still not possible to connect to a server. Even setting the Network Lock back to
"Automatic" still causes crashes; even when NL is not on. Changing the NL rule to "None" and not using NL, still means it's not
possible to connect.

Running Eddie as Administrator, under a Standard account, with NL off, NL firewall rules set to Automatic and the startup buttons unchecked, still means Eddie can't connect.

Tried turning NL off, setting NL rules to automatic and turning off all startup options. Then I restarted and went back into the Standard account.
Eddie can't connect to anything.

 

Logs:

 

After changing Eddie to WF:

 

. 2016.07.24 18:20:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:20:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:20:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.139:443
. 2016.07.24 18:20:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:20:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.14 255.255.0.0'
. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:20:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:20:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:20:22 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:20:22 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:20:22 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:20:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.16.14/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:20:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.16.14/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:20:22 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:20:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.139 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:27 - Starting Management Interface
. 2016.07.24 18:20:27 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:20:27 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:20:27 - Disconnecting
. 2016.07.24 18:20:27 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:20:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:20:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:20:27 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.139 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:32 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:20:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:20:32 - Connection terminated.
I 2016.07.24 18:20:32 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:20:35 - Checking authorization ...
! 2016.07.24 18:20:35 - Connecting to Atik (Netherlands, Alblasserdam)
. 2016.07.24 18:20:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:20:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:20:35 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:20:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:20:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:20:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:20:35 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:20:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443
. 2016.07.24 18:20:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=4f13cc64 dd02edf7
. 2016.07.24 18:20:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:20:35 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:20:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:20:35 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:20:35 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:20:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:20:35 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:20:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:20:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:20:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:20:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:20:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443
. 2016.07.24 18:20:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:20:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.187 255.255.0.0'
. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:20:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:20:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:20:38 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:20:38 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:20:38 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:20:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.187/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:20:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.187/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:20:38 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:20:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:43 - Starting Management Interface
. 2016.07.24 18:20:43 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:20:43 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:20:43 - Disconnecting
. 2016.07.24 18:20:43 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:20:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:20:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:20:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.9 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:48 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:20:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:20:48 - Connection terminated.
I 2016.07.24 18:20:48 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:20:51 - Checking authorization ...
! 2016.07.24 18:20:51 - Connecting to Alrami (Sweden, Uppsala)
. 2016.07.24 18:20:51 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:20:51 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:20:51 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:20:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:20:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:20:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:51 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:20:51 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:20:51 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.145:443
. 2016.07.24 18:20:51 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=2e47e915 f1ac9748
. 2016.07.24 18:20:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:20:51 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:20:51 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:20:51 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:20:51 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:20:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:20:51 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:20:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:20:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:20:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:20:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:20:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:20:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443
. 2016.07.24 18:20:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:20:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.129 255.255.0.0'
. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:20:54 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:20:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:20:54 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:20:54 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:20:54 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:20:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.129/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:20:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.129/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:20:54 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:20:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:20:59 - Starting Management Interface
. 2016.07.24 18:20:59 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:20:59 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:20:59 - Disconnecting
. 2016.07.24 18:20:59 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:20:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:20:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:20:59 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.145 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:04 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:21:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:21:04 - Connection terminated.
I 2016.07.24 18:21:04 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:21:07 - Checking authorization ...
! 2016.07.24 18:21:07 - Connecting to Kajam (Netherlands, Alblasserdam)
. 2016.07.24 18:21:07 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:21:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:21:07 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:21:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:21:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:21:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:21:07 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:21:07 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.84:443
. 2016.07.24 18:21:07 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.84:443, sid=cb1bff94 a24286ff
. 2016.07.24 18:21:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:21:07 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:21:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:21:07 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:21:07 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:21:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:21:07 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:21:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:21:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:21:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.84:443
. 2016.07.24 18:21:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:21:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.64 255.255.0.0'
. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:21:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:21:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:21:10 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:21:10 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:21:10 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:21:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.64/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:21:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.64/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:21:10 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:21:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.84 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:16 - Starting Management Interface
. 2016.07.24 18:21:16 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:21:16 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:21:16 - Disconnecting
. 2016.07.24 18:21:16 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:21:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:21:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:21:16 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.84 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:21 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:21:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:21:21 - Connection terminated.
I 2016.07.24 18:21:21 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:21:24 - Checking authorization ...
! 2016.07.24 18:21:24 - Connecting to Altarf (Sweden, Uppsala)
. 2016.07.24 18:21:24 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:21:24 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:21:24 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:21:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:21:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:21:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:24 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:21:24 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:21:24 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.140:443
. 2016.07.24 18:21:24 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=79154966 6c9f847f
. 2016.07.24 18:21:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:21:25 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:21:25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:21:25 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:21:25 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:21:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:21:25 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:21:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:21:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:21:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.140:443
. 2016.07.24 18:21:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:21:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.190 255.255.0.0'
. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:21:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:21:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:21:27 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:21:27 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:21:27 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:21:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.190/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:21:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:21:27 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:21:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.140 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:32 - Starting Management Interface
. 2016.07.24 18:21:32 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:21:32 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:21:32 - Disconnecting
. 2016.07.24 18:21:32 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:21:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:21:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:21:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.140 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:37 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:21:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:21:37 - Connection terminated.
I 2016.07.24 18:21:37 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:21:40 - Checking authorization ...
! 2016.07.24 18:21:40 - Connecting to Hatysa (Sweden, Uppsala)
. 2016.07.24 18:21:40 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:21:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:21:40 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:21:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:21:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:21:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:21:40 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:21:40 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443
. 2016.07.24 18:21:40 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=4e05c2ad e89c5041
. 2016.07.24 18:21:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:21:40 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:21:40 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:21:40 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:21:40 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:21:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:21:40 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:21:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:21:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:21:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.144:443
. 2016.07.24 18:21:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:21:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.118 255.255.0.0'
. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:21:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:21:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:21:43 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:21:43 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:21:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:21:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.118/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:21:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.118/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:21:43 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:21:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.144 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:48 - Starting Management Interface
. 2016.07.24 18:21:48 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:21:48 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:21:48 - Disconnecting
. 2016.07.24 18:21:48 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:21:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:21:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:21:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.144 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:21:53 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:21:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:21:53 - Connection terminated.
I 2016.07.24 18:21:53 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:21:56 - Checking authorization ...
! 2016.07.24 18:21:56 - Connecting to Algieba (Sweden, Uppsala)
. 2016.07.24 18:21:56 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:21:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:21:56 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:21:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:21:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:21:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:21:57 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:21:57 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.142:443
. 2016.07.24 18:21:57 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=97ff7e9f c20505eb
. 2016.07.24 18:21:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:21:57 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:21:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:21:57 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:21:57 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:21:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:21:57 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:21:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:21:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:21:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:21:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:21:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2016.07.24 18:21:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:21:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.82 255.255.0.0'
. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:21:59 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:21:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:21:59 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:21:59 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:21:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:21:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.1.82/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:21:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.82/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:21:59 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:22:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:04 - Starting Management Interface
. 2016.07.24 18:22:04 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:22:04 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:22:04 - Disconnecting
. 2016.07.24 18:22:04 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:22:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:22:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:22:04 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:09 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:22:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:22:09 - Connection terminated.
I 2016.07.24 18:22:09 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:22:12 - Checking authorization ...
! 2016.07.24 18:22:12 - Connecting to Phaet (Netherlands, Alblasserdam)
. 2016.07.24 18:22:12 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:22:12 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:22:12 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:22:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:22:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:22:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:22:13 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:22:13 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.148:443
. 2016.07.24 18:22:13 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.148:443, sid=1f9d0ae9 2b4919de
. 2016.07.24 18:22:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:22:13 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:22:13 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:22:13 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:22:13 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:22:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:22:13 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:22:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:22:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:22:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:22:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:22:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.148:443
. 2016.07.24 18:22:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:22:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.65.39 255.255.0.0'
. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:22:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:22:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:22:15 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:22:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:22:15 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:22:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.65.39/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:22:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.65.39/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:22:15 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:22:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.148 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:20 - Starting Management Interface
. 2016.07.24 18:22:20 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:22:20 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:22:20 - Disconnecting
. 2016.07.24 18:22:20 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:22:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:22:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:22:20 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.148 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:26 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:22:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:22:26 - Connection terminated.
I 2016.07.24 18:22:26 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:22:29 - Checking authorization ...
! 2016.07.24 18:22:29 - Connecting to Menkab (Sweden, Uppsala)
. 2016.07.24 18:22:29 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:22:29 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:22:29 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:22:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:22:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:22:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:29 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:22:29 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:22:29 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.143:443
. 2016.07.24 18:22:29 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=ec40e12d 9f3f95ce
. 2016.07.24 18:22:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:22:29 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:22:29 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:22:29 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:22:29 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:22:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:22:29 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:22:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:22:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:22:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:22:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:22:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.143:443
. 2016.07.24 18:22:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:22:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.132 255.255.0.0'
. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:22:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:22:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:22:32 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:22:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:22:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:22:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.132/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:22:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:22:32 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:22:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.143 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:37 - Starting Management Interface
. 2016.07.24 18:22:37 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:22:37 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:22:37 - Disconnecting
. 2016.07.24 18:22:37 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:22:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:22:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:22:37 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.143 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:42 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:22:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:22:42 - Connection terminated.
I 2016.07.24 18:22:42 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:22:45 - Checking authorization ...
! 2016.07.24 18:22:45 - Connecting to Alphecca (Netherlands, Alblasserdam)
. 2016.07.24 18:22:45 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:22:45 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:22:45 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:22:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:22:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:22:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:45 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:22:45 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:22:45 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.4:443
. 2016.07.24 18:22:45 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=5355732f 616cff46
. 2016.07.24 18:22:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:22:45 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:22:45 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:22:45 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:22:45 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:22:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:22:45 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:22:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:22:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:22:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:22:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:22:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:22:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443
. 2016.07.24 18:22:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:22:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.73 255.255.0.0'
. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:22:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:22:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:22:48 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:22:48 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:22:48 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:22:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.73/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:22:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.73/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:22:48 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:22:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.4 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:53 - Starting Management Interface
. 2016.07.24 18:22:53 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:22:53 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:22:53 - Disconnecting
. 2016.07.24 18:22:53 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:22:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:22:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:22:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.4 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:22:58 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:22:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:22:58 - Connection terminated.
I 2016.07.24 18:22:58 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:23:01 - Checking authorization ...
! 2016.07.24 18:23:02 - Connecting to Gomeisa (Sweden, Uppsala)
. 2016.07.24 18:23:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:23:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:23:02 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:23:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:23:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:23:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:23:02 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:23:02 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.132:443
. 2016.07.24 18:23:02 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=d51a70a7 a2362533
. 2016.07.24 18:23:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:23:02 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:23:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:23:02 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:23:02 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:23:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:23:02 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:23:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:23:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:23:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.132:443
. 2016.07.24 18:23:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:23:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.38.236 255.255.0.0'
. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:23:04 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:23:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:23:04 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:23:04 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:23:04 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:23:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.38.236/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:23:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.38.236/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:23:04 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:23:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.132 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:09 - Starting Management Interface
. 2016.07.24 18:23:09 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:23:09 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:23:09 - Disconnecting
. 2016.07.24 18:23:09 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:23:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:23:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:23:09 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.132 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:14 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:23:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:23:14 - Connection terminated.
I 2016.07.24 18:23:14 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:23:17 - Checking authorization ...
! 2016.07.24 18:23:17 - Connecting to Ancha (Netherlands, Alblasserdam)
. 2016.07.24 18:23:17 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:23:17 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:23:17 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:23:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:23:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:23:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:17 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:23:17 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:23:17 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.164:443
. 2016.07.24 18:23:17 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=fff50348 39acebca
. 2016.07.24 18:23:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:23:17 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:23:17 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:23:17 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:23:17 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:23:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:23:17 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:23:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:23:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:23:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443
. 2016.07.24 18:23:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:23:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.141 255.255.0.0'
. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:23:20 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:23:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:23:20 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:23:20 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:23:20 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:23:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.141/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:23:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.141/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:23:20 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:23:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.164 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:25 - Starting Management Interface
. 2016.07.24 18:23:25 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:23:25 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:23:25 - Disconnecting
. 2016.07.24 18:23:25 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:23:25 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:23:25 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:23:25 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.164 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:30 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:23:30 - Connection terminated.
. 2016.07.24 18:23:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
I 2016.07.24 18:23:30 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:23:33 - Checking authorization ...
! 2016.07.24 18:23:34 - Connecting to Atria (Sweden, Uppsala)
. 2016.07.24 18:23:34 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:23:34 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:23:34 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:23:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:23:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:23:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:34 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:23:34 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:23:34 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443
. 2016.07.24 18:23:34 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=8df69e63 1ced5690
. 2016.07.24 18:23:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:23:34 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:23:34 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:23:34 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:23:34 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:23:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:23:34 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:23:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:23:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:23:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443
. 2016.07.24 18:23:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:23:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.32 255.255.0.0'
. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:23:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:23:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:23:36 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:23:36 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:23:36 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:23:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.32/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:23:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.32/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:23:36 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:23:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:41 - Starting Management Interface
. 2016.07.24 18:23:41 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:23:41 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:23:41 - Disconnecting
. 2016.07.24 18:23:41 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:23:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:23:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:23:41 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:46 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:23:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:23:46 - Connection terminated.
I 2016.07.24 18:23:46 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:23:49 - Checking authorization ...
! 2016.07.24 18:23:49 - Connecting to Aquilae (Germany, Frankfurt)
. 2016.07.24 18:23:49 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:23:49 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:23:49 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:23:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:23:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:23:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:49 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:23:49 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:23:49 - OpenVPN > UDPv4 link remote: [AF_INET]46.165.208.70:443
. 2016.07.24 18:23:49 - OpenVPN > TLS: Initial packet from [AF_INET]46.165.208.70:443, sid=983eb5f2 9da0d903
. 2016.07.24 18:23:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:23:49 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:23:49 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:23:49 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:23:49 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:23:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:23:49 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:23:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:23:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:23:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:23:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:23:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.165.208.70:443
. 2016.07.24 18:23:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:23:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.123 255.255.0.0'
. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:23:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:23:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:23:52 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:23:52 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:23:52 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:23:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.21.123/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:23:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.21.123/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:23:52 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:23:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 46.165.208.70 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:23:57 - Starting Management Interface
. 2016.07.24 18:23:57 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:23:57 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:23:57 - Disconnecting
. 2016.07.24 18:23:57 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:23:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:23:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:23:57 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.165.208.70 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:24:02 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:24:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:24:02 - Connection terminated.
I 2016.07.24 18:24:02 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:24:05 - Checking authorization ...
! 2016.07.24 18:24:05 - Connecting to Muphrid (Sweden, Uppsala)
. 2016.07.24 18:24:05 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:24:05 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:24:05 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:24:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:24:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:24:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:24:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:24:05 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:24:05 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:24:05 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443
. 2016.07.24 18:24:05 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=31e78eb3 40e65ab5
. 2016.07.24 18:24:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:24:05 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:24:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:24:05 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:24:05 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:24:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:24:05 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:24:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:24:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:24:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:24:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:24:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:24:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:24:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443
 

 

After changing to WPF again:

 

. 2016.07.24 18:25:28 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:25:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:25:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:25:28 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.147 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:33 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:25:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:25:33 - Connection terminated.
I 2016.07.24 18:25:33 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:25:36 - Checking authorization ...
! 2016.07.24 18:25:36 - Connecting to Gianfar (Netherlands, Alblasserdam)
. 2016.07.24 18:25:36 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:25:36 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:25:36 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:25:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:25:37 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:25:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:37 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:25:37 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:25:37 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.100:443
. 2016.07.24 18:25:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.100:443, sid=e0b428c3 299a05cd
. 2016.07.24 18:25:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:25:37 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:25:37 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:25:37 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:25:37 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:25:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:25:37 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:25:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:25:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:25:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:25:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:25:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.100:443
. 2016.07.24 18:25:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:25:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.58.237 255.255.0.0'
. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:25:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:25:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:25:39 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:25:39 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:25:39 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:25:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.58.237/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:25:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.58.237/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:25:39 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:25:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.100 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:44 - Starting Management Interface
. 2016.07.24 18:25:44 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:25:44 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:25:44 - Disconnecting
. 2016.07.24 18:25:44 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:25:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:25:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:25:44 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.100 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:25:49 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:25:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:25:49 - Connection terminated.
I 2016.07.24 18:25:49 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:25:52 - Checking authorization ...
! 2016.07.24 18:25:52 - Connecting to Situla (Netherlands, Alblasserdam)
. 2016.07.24 18:25:52 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:25:52 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:25:52 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:25:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:25:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:25:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:52 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:25:52 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:25:52 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443
. 2016.07.24 18:25:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=d61f8a2a 8451263e
. 2016.07.24 18:25:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:25:52 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:25:52 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:25:52 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:25:52 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:25:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:25:52 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:25:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:25:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:25:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:25:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:25:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:25:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443
. 2016.07.24 18:25:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:25:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.9 255.255.0.0'
. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:25:55 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:25:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:25:55 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:25:55 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:25:55 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:25:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.9/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:25:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.9/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:25:55 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:26:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.14 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:00 - Starting Management Interface
. 2016.07.24 18:26:00 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:26:00 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:26:00 - Disconnecting
. 2016.07.24 18:26:00 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:26:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:26:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:26:00 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.14 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:05 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:26:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:26:05 - Connection terminated.
I 2016.07.24 18:26:05 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:26:08 - Checking authorization ...
! 2016.07.24 18:26:08 - Connecting to Subra (Netherlands, Alblasserdam)
. 2016.07.24 18:26:08 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:26:08 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:26:08 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:26:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:26:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:26:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:08 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:26:08 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:26:08 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443
. 2016.07.24 18:26:08 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=3d7ee063 59907970
. 2016.07.24 18:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:26:09 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:26:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:26:09 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:26:09 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:26:09 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:26:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:26:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443
. 2016.07.24 18:26:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:26:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.62.132 255.255.0.0'
. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:26:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:26:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:26:11 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:26:11 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:26:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:26:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.62.132/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:26:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.62.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:26:11 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:26:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.98 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:16 - Starting Management Interface
. 2016.07.24 18:26:16 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:26:16 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:26:16 - Disconnecting
. 2016.07.24 18:26:16 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:26:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:26:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:26:16 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.98 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:21 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:26:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:26:21 - Connection terminated.
I 2016.07.24 18:26:21 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:26:24 - Checking authorization ...
! 2016.07.24 18:26:25 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.07.24 18:26:25 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:26:25 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:26:25 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:26:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:26:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:26:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:25 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:26:25 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:26:25 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.07.24 18:26:25 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=10efcf5e b4499cd4
. 2016.07.24 18:26:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:26:25 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:26:25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:26:25 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:26:25 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:26:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:26:25 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:26:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:26:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:26:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.07.24 18:26:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:26:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.63.139 255.255.0.0'
. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:26:28 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:26:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:26:28 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:26:28 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:26:28 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:26:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.63.139/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:26:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.63.139/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:26:28 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:26:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:33 - Starting Management Interface
. 2016.07.24 18:26:33 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:26:33 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:26:33 - Disconnecting
. 2016.07.24 18:26:33 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:26:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:26:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:26:33 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:38 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:26:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:26:38 - Connection terminated.
I 2016.07.24 18:26:38 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:26:41 - Checking authorization ...
! 2016.07.24 18:26:41 - Connecting to Alrai (Netherlands, Alblasserdam)
. 2016.07.24 18:26:41 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:26:41 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:26:41 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:26:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:26:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:26:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:41 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:26:41 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:26:41 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.78:443
. 2016.07.24 18:26:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.78:443, sid=3aaf076d 8ac56fbb
. 2016.07.24 18:26:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:26:41 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:26:41 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:26:41 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:26:41 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:26:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:26:41 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:26:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:26:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:26:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.78:443
. 2016.07.24 18:26:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:26:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.190 255.255.0.0'
. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:26:44 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:26:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:26:44 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:26:44 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:26:44 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:26:44 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.190/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:26:44 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:26:44 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:26:49 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.78 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:49 - Starting Management Interface
. 2016.07.24 18:26:49 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:26:49 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:26:49 - Disconnecting
. 2016.07.24 18:26:49 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:26:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:26:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:26:49 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.78 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:26:54 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:26:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:26:54 - Connection terminated.
I 2016.07.24 18:26:54 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:26:57 - Checking authorization ...
! 2016.07.24 18:26:57 - Connecting to Marfic (France, Paris)
. 2016.07.24 18:26:57 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:26:57 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:26:57 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:26:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:26:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:26:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:26:57 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:26:57 - OpenVPN > UDPv4 link remote: [AF_INET]195.154.194.18:443
. 2016.07.24 18:26:57 - OpenVPN > TLS: Initial packet from [AF_INET]195.154.194.18:443, sid=98f88da9 b9514889
. 2016.07.24 18:26:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:26:57 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:26:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:26:57 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:26:57 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:26:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:26:57 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:26:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:26:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:26:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:26:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:26:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]195.154.194.18:443
. 2016.07.24 18:27:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:27:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.216 255.255.0.0'
. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:27:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:27:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:27:00 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:27:00 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:27:00 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:27:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.216/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:27:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.216/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:27:00 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:27:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 195.154.194.18 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:05 - Starting Management Interface
. 2016.07.24 18:27:05 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:27:05 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:27:05 - Disconnecting
. 2016.07.24 18:27:05 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:27:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:27:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:27:05 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 195.154.194.18 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:10 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:27:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:27:10 - Connection terminated.
I 2016.07.24 18:27:10 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:27:13 - Checking authorization ...
! 2016.07.24 18:27:13 - Connecting to Gienah (Netherlands, Alblasserdam)
. 2016.07.24 18:27:13 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:27:13 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:27:13 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:27:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:27:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:27:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:27:13 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:27:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443
. 2016.07.24 18:27:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=63147a90 a8a9482b
. 2016.07.24 18:27:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:27:13 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:27:13 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:27:13 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:27:13 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:27:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:27:13 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:27:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:27:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:27:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:27:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:27:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443
. 2016.07.24 18:27:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:27:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.23 255.255.0.0'
. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:27:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:27:16 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:27:16 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:27:16 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:27:16 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:27:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.23/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:27:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.23/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:27:16 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:27:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.93 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:21 - Starting Management Interface
. 2016.07.24 18:27:21 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:27:21 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:27:21 - Disconnecting
. 2016.07.24 18:27:21 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:27:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:27:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:27:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.93 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:26 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:27:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:27:26 - Connection terminated.
I 2016.07.24 18:27:26 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:27:29 - Checking authorization ...
! 2016.07.24 18:27:30 - Connecting to Skat (Netherlands, Alblasserdam)
. 2016.07.24 18:27:30 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:27:30 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:27:30 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:27:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:27:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:27:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:30 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:27:30 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:27:30 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.73:443
. 2016.07.24 18:27:30 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.73:443, sid=fee449c8 6edbc995
. 2016.07.24 18:27:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:27:30 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:27:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:27:30 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:27:30 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:27:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:27:30 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:27:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:27:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:27:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:27:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:27:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.73:443
. 2016.07.24 18:27:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:27:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.242 255.255.0.0'
. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:27:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:27:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:27:32 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:27:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:27:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:27:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.242/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:27:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.242/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:27:32 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:27:38 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.73 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:38 - Starting Management Interface
. 2016.07.24 18:27:38 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:27:38 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:27:38 - Disconnecting
. 2016.07.24 18:27:38 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:27:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:27:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:27:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.73 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:43 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:27:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:27:43 - Connection terminated.
I 2016.07.24 18:27:43 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:27:46 - Checking authorization ...
! 2016.07.24 18:27:46 - Connecting to Minkar (United Kingdom, Maidenhead)
. 2016.07.24 18:27:46 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:27:46 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:27:46 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:27:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:27:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:27:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:46 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:27:46 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:27:46 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.130:443
. 2016.07.24 18:27:46 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.130:443, sid=055d3daf d9c73205
. 2016.07.24 18:27:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:27:46 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:27:46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:27:46 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:27:46 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:27:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:27:46 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:27:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:27:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:27:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:27:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:27:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:27:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.130:443
. 2016.07.24 18:27:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:27:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.215 255.255.0.0'
. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:27:49 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:27:49 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:27:49 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:27:49 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:27:49 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:27:49 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.215/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:27:49 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.215/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:27:49 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:27:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.130 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:54 - Starting Management Interface
. 2016.07.24 18:27:54 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:27:54 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:27:54 - Disconnecting
. 2016.07.24 18:27:54 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:27:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:27:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:27:54 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.130 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:27:59 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:27:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:27:59 - Connection terminated.
I 2016.07.24 18:27:59 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:28:02 - Checking authorization ...
! 2016.07.24 18:28:02 - Connecting to Matar (Netherlands, Alblasserdam)
. 2016.07.24 18:28:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:28:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:28:02 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:28:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:28:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:28:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:28:02 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:28:02 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.137:443
. 2016.07.24 18:28:02 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.137:443, sid=7fa108fa 4652ecb8
. 2016.07.24 18:28:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:28:02 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:28:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:28:02 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:28:02 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:28:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:28:02 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:28:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:28:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:28:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.137:443
. 2016.07.24 18:28:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:28:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.25 255.255.0.0'
. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:28:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:28:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:28:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:28:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:28:05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:28:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.25/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:28:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.25/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:28:05 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:28:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.137 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:10 - Starting Management Interface
. 2016.07.24 18:28:10 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:28:10 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:28:10 - Disconnecting
. 2016.07.24 18:28:10 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:28:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:28:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:28:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.137 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:15 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:28:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:28:15 - Connection terminated.
I 2016.07.24 18:28:15 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:28:18 - Checking authorization ...
! 2016.07.24 18:28:18 - Connecting to Hyadum (Netherlands, Alblasserdam)
. 2016.07.24 18:28:18 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:28:18 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:28:18 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:28:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:28:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:28:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:18 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:28:18 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:28:18 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.34:443
. 2016.07.24 18:28:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.34:443, sid=c7d25aa4 ae64e4b3
. 2016.07.24 18:28:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:28:18 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:28:18 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:28:18 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:28:18 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:28:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:28:18 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:28:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:28:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:28:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.34:443
. 2016.07.24 18:28:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:28:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.99 255.255.0.0'
. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:28:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:28:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:28:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:28:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:28:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:28:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.99/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:28:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.99/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:28:21 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:28:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.34 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:26 - Starting Management Interface
. 2016.07.24 18:28:26 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:28:26 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:28:26 - Disconnecting
. 2016.07.24 18:28:26 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:28:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:28:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:28:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.34 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:31 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:28:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:28:31 - Connection terminated.
I 2016.07.24 18:28:31 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:28:34 - Checking authorization ...
! 2016.07.24 18:28:35 - Connecting to Miram (Netherlands, Alblasserdam)
. 2016.07.24 18:28:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:28:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:28:35 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:28:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:28:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:28:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:28:35 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:28:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443
. 2016.07.24 18:28:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=37de9d8a 237c9ec3
. 2016.07.24 18:28:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:28:35 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:28:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:28:35 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:28:35 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:28:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:28:35 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:28:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:28:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:28:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443
. 2016.07.24 18:28:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:28:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.89 255.255.0.0'
. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:28:37 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:28:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:28:37 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:28:37 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:28:37 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:28:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.89/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:28:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.89/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:28:37 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:28:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:43 - Starting Management Interface
. 2016.07.24 18:28:43 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:28:43 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:28:43 - Disconnecting
. 2016.07.24 18:28:43 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:28:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:28:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:28:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:48 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:28:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:28:48 - Connection terminated.
I 2016.07.24 18:28:48 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:28:51 - Checking authorization ...
! 2016.07.24 18:28:51 - Connecting to Albali (Sweden, Uppsala)
. 2016.07.24 18:28:51 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:28:51 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:28:51 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:28:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:28:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:28:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:51 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:28:51 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:28:51 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.149:443
. 2016.07.24 18:28:51 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.149:443, sid=44b2e29b df70c45f
. 2016.07.24 18:28:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:28:51 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:28:51 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:28:51 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:28:51 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:28:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:28:51 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:28:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:28:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:28:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:28:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:28:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.149:443
. 2016.07.24 18:28:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:28:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.225 255.255.0.0'
. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:28:54 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:28:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:28:54 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:28:54 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:28:54 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:28:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.225/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:28:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.225/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:28:54 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:28:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.149 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:28:59 - Starting Management Interface
. 2016.07.24 18:28:59 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:28:59 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:28:59 - Disconnecting
. 2016.07.24 18:28:59 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:28:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:28:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:28:59 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:28:59 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.149 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:29:04 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:29:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:29:04 - Connection terminated.
I 2016.07.24 18:29:04 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:29:07 - Checking authorization ...
! 2016.07.24 18:29:07 - Connecting to Pherkad (Sweden, Uppsala)
. 2016.07.24 18:29:07 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:29:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:29:07 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:29:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:29:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:29:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:29:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:29:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:29:07 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:29:07 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.134:443
. 2016.07.24 18:29:07 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.134:443, sid=35cc3a59 7c93f73e
. 2016.07.24 18:29:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:29:07 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:29:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:29:07 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:29:07 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:29:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:29:07 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:29:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:29:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:29:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:29:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:29:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:29:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:29:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.134:443
. 2016.07.24 18:29:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:29:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.43.225 255.255.0.0'
. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:29:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:29:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:29:10 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:29:10 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:29:10 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:29:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.43.225/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:29:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.43.225/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:29:10 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:29:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.134 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:29:15 - Starting Management Interface
. 2016.07.24 18:29:15 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:29:15 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:29:15 - Disconnecting
. 2016.07.24 18:29:15 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:29:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:29:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:29:15 - OpenVPN > SIGTERM received, sending exit notification to peer

 

After resetting everything:

 

I 2016.07.24 18:48:16 - Eddie client version: 2.11.2 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2016.07.24 18:48:16 - Reading options from C:\Users\U1\AppData\Local\AirVPN\AirVPN.xml
. 2016.07.24 18:48:16 - Data Path: C:\Users\U1\AppData\Local\AirVPN
. 2016.07.24 18:48:16 - App Path: C:\Program Files\AirVPN
. 2016.07.24 18:48:16 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.07.24 18:48:16 - Command line arguments (1): path="home"
. 2016.07.24 18:48:16 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
I 2016.07.24 18:48:18 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2016.07.24 18:48:18 - OpenVPN - Version: OpenVPN 2.3.11 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.07.24 18:48:18 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.07.24 18:48:18 - SSL - Version: stunnel 5.32 (C:\Program Files\AirVPN\stunnel.exe)
W 2016.07.24 18:48:20 - Recovery. Unexpected crash?
I 2016.07.24 18:48:20 - IPv6 restored with registry changes.
! 2016.07.24 18:48:20 - Ready
. 2016.07.24 18:48:20 - Updating systems & servers data ...
. 2016.07.24 18:48:21 - Systems & servers data update completed
I 2016.07.24 18:48:23 - Session starting.
I 2016.07.24 18:48:24 - IPv6 disabled with packet filtering.
I 2016.07.24 18:48:24 - IPv6 disabled with registry changes.
I 2016.07.24 18:48:24 - Checking authorization ...
! 2016.07.24 18:48:24 - Connecting to Hatysa (Sweden, Uppsala)
. 2016.07.24 18:48:24 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:48:24 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:48:24 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:48:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:48:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:48:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:24 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:48:24 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:48:24 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443
. 2016.07.24 18:48:24 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=b029ec2e da35a15f
. 2016.07.24 18:48:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:48:24 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:48:24 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:48:24 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:48:24 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:48:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:48:24 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:48:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:48:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:48:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:48:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:48:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.144:443
. 2016.07.24 18:48:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:48:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.118 255.255.0.0'
. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:48:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:48:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:48:27 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:48:27 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:48:27 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:48:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.118/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:48:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.118/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:48:27 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:48:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.144 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:32 - Starting Management Interface
. 2016.07.24 18:48:32 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:48:32 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:48:32 - Disconnecting
. 2016.07.24 18:48:32 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:48:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:48:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:48:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.144 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:37 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:48:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:48:37 - Connection terminated.
I 2016.07.24 18:48:37 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:48:40 - Checking authorization ...
! 2016.07.24 18:48:40 - Connecting to Muphrid (Sweden, Uppsala)
. 2016.07.24 18:48:40 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:48:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:48:40 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:48:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:48:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:48:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:48:40 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:48:40 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443
. 2016.07.24 18:48:40 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=5d0ea970 257b20fd
. 2016.07.24 18:48:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:48:40 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:48:40 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:48:40 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:48:40 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:48:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:48:40 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:48:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:48:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:48:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:48:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:48:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443
. 2016.07.24 18:48:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:48:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.31 255.255.0.0'
. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:48:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:48:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:48:43 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:48:43 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:48:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:48:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.3.31/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:48:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.31/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:48:43 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:48:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.146 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:48 - Starting Management Interface
. 2016.07.24 18:48:48 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:48:48 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:48:48 - Disconnecting
. 2016.07.24 18:48:48 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:48:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:48:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:48:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.146 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:48:53 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:48:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:48:53 - Connection terminated.
I 2016.07.24 18:48:53 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:48:56 - Checking authorization ...
! 2016.07.24 18:48:56 - Connecting to Atria (Sweden, Uppsala)
. 2016.07.24 18:48:56 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:48:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:48:56 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:48:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:48:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:48:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:56 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:48:56 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:48:56 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443
. 2016.07.24 18:48:56 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=0a23cbb1 88a9c2ef
. 2016.07.24 18:48:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:48:56 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:48:56 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:48:56 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:48:56 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:48:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:48:56 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:48:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:48:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:48:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:48:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:48:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:48:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443
. 2016.07.24 18:48:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:48:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.32 255.255.0.0'
. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:48:59 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:48:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:48:59 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:48:59 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:48:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:48:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.32/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:48:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.32/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:48:59 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:49:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:04 - Starting Management Interface
. 2016.07.24 18:49:04 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:49:04 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:49:04 - Disconnecting
. 2016.07.24 18:49:04 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:49:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:49:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:49:04 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:09 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:49:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:49:09 - Connection terminated.
I 2016.07.24 18:49:09 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:49:12 - Checking authorization ...
! 2016.07.24 18:49:12 - Connecting to Serpentis (Sweden, Uppsala)
. 2016.07.24 18:49:13 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:49:13 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:49:13 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:49:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:49:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:49:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:49:13 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:49:13 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.139:443
. 2016.07.24 18:49:13 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.139:443, sid=20ed0f0d 3bcef95f
. 2016.07.24 18:49:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:49:13 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:49:13 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:49:13 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:49:13 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:49:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:49:13 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:49:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:49:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:49:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:49:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:49:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.139:443
. 2016.07.24 18:49:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:49:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.14 255.255.0.0'
. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:49:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:49:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:49:15 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:49:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:49:15 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:49:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.16.14/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:49:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.16.14/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:49:15 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:49:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.139 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:20 - Starting Management Interface
. 2016.07.24 18:49:20 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:49:20 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:49:20 - Disconnecting
. 2016.07.24 18:49:20 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:49:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:49:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:49:20 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.139 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:26 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:49:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:49:26 - Connection terminated.
I 2016.07.24 18:49:26 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:49:29 - Checking authorization ...
! 2016.07.24 18:49:29 - Connecting to Alrami (Sweden, Uppsala)
. 2016.07.24 18:49:29 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:49:29 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:49:29 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:49:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:49:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:49:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:29 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:49:29 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:49:29 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.145:443
. 2016.07.24 18:49:29 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=a0de33bd 3bd114d3
. 2016.07.24 18:49:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:49:29 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:49:29 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:49:29 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:49:29 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:49:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:49:29 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:49:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:49:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:49:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:49:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:49:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443
. 2016.07.24 18:49:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:49:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.129 255.255.0.0'
. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:49:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:49:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:49:32 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:49:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:49:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:49:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.129/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:49:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.129/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:49:32 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:49:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:37 - Starting Management Interface
. 2016.07.24 18:49:37 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:49:37 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:49:37 - Disconnecting
. 2016.07.24 18:49:37 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:49:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:49:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:49:37 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.145 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:42 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:49:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:49:42 - Connection terminated.
I 2016.07.24 18:49:42 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:49:46 - Checking authorization ...
! 2016.07.24 18:49:46 - Connecting to Menkab (Sweden, Uppsala)
. 2016.07.24 18:49:46 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:49:46 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:49:46 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:49:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:49:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:49:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:46 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:49:46 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:49:46 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.143:443
. 2016.07.24 18:49:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=431f463c 20327492
. 2016.07.24 18:49:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:49:46 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:49:46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:49:46 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:49:46 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:49:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:49:46 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:49:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:49:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:49:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:49:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:49:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:49:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.143:443
. 2016.07.24 18:49:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:49:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.132 255.255.0.0'
. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:49:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:49:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:49:48 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:49:48 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:49:48 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:49:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.132/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:49:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:49:48 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:49:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.143 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:53 - Starting Management Interface
. 2016.07.24 18:49:53 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:49:53 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:49:53 - Disconnecting
. 2016.07.24 18:49:53 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:49:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:49:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:49:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.143 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:49:58 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:49:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:49:58 - Connection terminated.
I 2016.07.24 18:49:58 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:50:01 - Checking authorization ...
! 2016.07.24 18:50:02 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.07.24 18:50:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:50:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:50:02 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:50:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:50:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:50:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:50:02 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:50:02 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.137:443
. 2016.07.24 18:50:02 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.137:443, sid=0a201ab1 82422541
. 2016.07.24 18:50:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:50:02 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:50:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:50:02 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:50:02 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:50:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:50:02 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:50:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:50:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:50:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.137:443
. 2016.07.24 18:50:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:50:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.202 255.255.0.0'
. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:50:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:50:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:50:05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:50:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:50:05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:50:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.202/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:50:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.202/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:50:05 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:50:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.137 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:10 - Starting Management Interface
. 2016.07.24 18:50:10 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:50:10 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:50:10 - Disconnecting
. 2016.07.24 18:50:10 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:50:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:50:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:50:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.137 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:15 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:50:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:50:15 - Connection terminated.
I 2016.07.24 18:50:15 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:50:18 - Checking authorization ...
! 2016.07.24 18:50:18 - Connecting to Alula (Sweden, Uppsala)
. 2016.07.24 18:50:18 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:50:18 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:50:18 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:50:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:50:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:50:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:18 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:50:18 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:50:18 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.151:443
. 2016.07.24 18:50:18 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.151:443, sid=e0da2a96 5a9581a6
. 2016.07.24 18:50:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:50:18 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:50:18 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:50:18 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:50:18 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:50:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:50:18 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:50:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:50:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:50:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.151:443
. 2016.07.24 18:50:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:50:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.105 255.255.0.0'
. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:50:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:50:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:50:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:50:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:50:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:50:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.105/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:50:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.105/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:50:21 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:50:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.151 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:26 - Starting Management Interface
. 2016.07.24 18:50:26 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:50:26 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:50:26 - Disconnecting
. 2016.07.24 18:50:26 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:50:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:50:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:50:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.151 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:31 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:50:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:50:31 - Connection terminated.
I 2016.07.24 18:50:31 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:50:34 - Checking authorization ...
! 2016.07.24 18:50:35 - Connecting to Altarf (Sweden, Uppsala)
. 2016.07.24 18:50:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:50:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:50:35 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:50:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:50:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:50:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:50:35 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:50:35 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.140:443
. 2016.07.24 18:50:35 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=875daa1e f2b5dd04
. 2016.07.24 18:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:50:35 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:50:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:50:35 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:50:35 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:50:35 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:50:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.140:443
. 2016.07.24 18:50:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:50:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.190 255.255.0.0'
. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:50:37 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:50:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:50:37 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:50:37 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:50:37 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:50:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.190/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:50:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:50:37 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}
. 2016.07.24 18:50:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.140 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:42 - Starting Management Interface
. 2016.07.24 18:50:42 - OpenVPN > Initialization Sequence Completed
W 2016.07.24 18:50:42 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}'
! 2016.07.24 18:50:42 - Disconnecting
. 2016.07.24 18:50:42 - Management - Send 'signal SIGTERM'
. 2016.07.24 18:50:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.24 18:50:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.07.24 18:50:42 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.140 MASK 255.255.255.255 192.168.1.1
. 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.07.24 18:50:47 - OpenVPN > Closing TUN/TAP interface
. 2016.07.24 18:50:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.07.24 18:50:47 - Connection terminated.
I 2016.07.24 18:50:47 - DNS leak protection with packet filtering disabled.
I 2016.07.24 18:50:50 - Checking authorization ...
! 2016.07.24 18:50:50 - Connecting to Hassaleh (Netherlands, Alblasserdam)
. 2016.07.24 18:50:50 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.07.24 18:50:50 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.07.24 18:50:50 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.07.24 18:50:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.24 18:50:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.24 18:50:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:50 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.07.24 18:50:50 - OpenVPN > UDPv4 link local: [undef]
. 2016.07.24 18:50:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.39:443
. 2016.07.24 18:50:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.39:443, sid=587dfb98 d170be2d
. 2016.07.24 18:50:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.24 18:50:50 - OpenVPN > Validating certificate key usage
. 2016.07.24 18:50:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.07.24 18:50:50 - OpenVPN > VERIFY KU OK
. 2016.07.24 18:50:50 - OpenVPN > Validating certificate extended key usage
. 2016.07.24 18:50:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.24 18:50:50 - OpenVPN > VERIFY EKU OK
. 2016.07.24 18:50:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.24 18:50:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.24 18:50:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.24 18:50:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.24 18:50:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.39:443
. 2016.07.24 18:50:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.24 18:50:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.138 255.255.0.0'
. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.24 18:50:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b
. 2016.07.24 18:50:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.24 18:50:53 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.24 18:50:53 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap
. 2016.07.24 18:50:53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.07.24 18:50:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.138/255.255.0.0 [sUCCEEDED]
. 2016.07.24 18:50:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.138/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.07.24 18:50:53 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6}

 

 

 

 

Feel free to tell me if there's more information I can provide

#datalove

 

EDIT: Doesn't work on Admin account either now.

 

EDIT 2: There's a popup when it crashes, which reads:

 

AirVPN

Unexpected error. Please contact our support staff. -

Unexpected: NetLock WFP rule doesn't exists - at

Eddie.Platforms.NetworkLockWfp.RemoveRule(String code)

at Eddie.Core.InterfaceScope.End()

at Eddie.Core.InterfaceScope.Finalize()

 

 

I hope this helps


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

@LZ1

 

Network Lock is "not active" if Eddie is not running, unless it crashed. When you shut down the software, previous firewall rules (or WFP settings) are restored. This is precisely consistent on all system and with all previous Eddie versions, nothing has changed.

 

Sockets buffers size are set on system defaults on all OS, except in Windows, where the size picked by the system is not acceptable (too small). See the changelog.

 

The menu button is lighted off. When the mouse pointer slides over it turns on.

 

Kind regards

 

Mmm, maybe I was unclear. I'm used to not being able to go online, until Eddie has started (we're talking about on system startup) and I assume this is due to NL. Since if Eddie doesn't start, then I can't go online, which I'm happy with. Does this make sense?  Also, I wasn't being clear, I just meant to state it as a preference that I don't like the logo being greyed out and only highlighting on mouse-over, haha. Just in case, you know, Clodo is looking for design opinions! Hahaha. Thank you for replying so quickly. In case you didn't see it, I added another Edit to my "Report" post. Have a nice day


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

 

Mmm, maybe I was unclear. I'm used to not being able to go online, until Eddie has started (we're talking about on system startup) and I assume this is due to NL. Since if Eddie doesn't start, then I can't go online, which I'm happy with. Does this make sense? 

 

Hello!

 

Understood and we repeat that it's not how Network Lock is expected to work. Is this happening with Eddie 2.11.2, or did you have this behavior on Eddie 2.10.3 as well?

 

Kind regards

Share this post


Link to post

2.10.3 and that was on both Windows 8 64-bit & 7 64-bit I think.

​I also just got 2.11.2 to connect again, on the Admin account, after many restarts.

​Edit: I should add this is all happening of Home Editions of both OS's.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

2.10.3 and that was on both Windows 8 64-bit & 7 64-bit I think. :)

 

 

Good, so it should be some other problem, not a specific regression of 2.11.2 (good for 2.11.2 we mean!). Maybe it's just a DNS issue, unrelated to Network Lock, that you have since you used Eddie 2.10.3 (it had a bug for which under peculiar circumstances it did not restore properly previous DNS settings in Windows interfaces). So a plausible explanation is that you have the impression you have no connectivity, but in reality you have it. It's only that the system can't resolve names.

 

Kind regards

Share this post


Link to post

 

2.10.3 and that was on both Windows 8 64-bit & 7 64-bit I think.

 

 

Good, so it should be some other problem, not a specific regression of 2.11.2 (good for 2.11.2 we mean!). Maybe it's just a DNS issue, unrelated to Network Lock, that you have since you used Eddie 2.10.3 (it had a bug for which under peculiar circumstances it did not restore properly previous DNS settings in Windows interfaces). So a plausible explanation is that you have the impression you have no connectivity, but in reality you have it. It's only that the system can't resolve names.

 

Kind regards

That is quite possible . I thought it was a feature, not a bug though, so I'm a happy customer ("network lock really works!!") lol. If I tried recreating the scenario and then pinged a website and got a response, would that prove it's probably a DNS issue, if I otherwise can't access websites? Please feel free to tell me if there's any other pieces of information I can add to this or my "Report" post. I'll try out 2.11.2 on Windows 8 as well, eventually.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

That is quite possible . I thought it was a feature, not a bug though, so I'm a happy customer ("network lock really works!!") lol. If I tried recreating the scenario and then pinged a website and got a response, would that prove it's probably a DNS issue, if I otherwise can't access websites? Please feel free to tell me if there's any other pieces of information I can add to this or my "Report" post. I'll try out 2.11.2 on Windows 8 as well, eventually.

 

If you can ping a website's IP but not their domain name then it's the DNS issue. You can also just check your adapter's IPv4 settings, it will be stuck on AirVPN's DNS settings when it should be set to auto (or whatever you had there before). With the DNS issue other services are usually able to connect as well (iirc Steam, Spotify, Skype and services like that still work just fine).

Share this post


Link to post

 

 

Still can't download the windows version for the beta.

 

@vpro_

 

Windows XP 64-bit .exe Installer:  https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_installer.exe

 

Windows XP 64-bit .zip Portable:  https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_portable.zip

 

Windows Vista / 7 64-bit .exe Installer:  https://airvpn.org/repository/experimental/airvpn_windows_x64_installer.exe

 

Windows Vista / 7 64-bit .zip Portable:  https://airvpn.org/repository/experimental/airvpn_windows_x64_portable.zip

 

Windows 8, 8.1, 10 64-bit .exe Installer:  https://airvpn.org/repository/experimental/airvpn_windows8_x64_installer.exe

 

Windows 8, 8.1, 10 64-bit .zip Portable:  https://airvpn.org/repository/experimental/airvpn_windows8_x64_portable.zip

 

-Uncle Hunto

 

 

 

still says 2.10.3 after install

Share this post


Link to post

Feature request.

Add the airvpn exit ip and server name onto MacOS menu bar next to the airvpn icon. this feature could be enabled and disabled from eddie's settings.

Share this post


Link to post

still says 2.10.3 after install

 

@vpro_

That's odd, it sounds like other people posting in this thread have been able to successfully download the new beta versions for Windows. Which Windows version (XP, Vista/7, 8/10) are you trying to install? Which AirVPN version (.exe Installer, .zip portable) are you trying to install? Have you tried checking the hash of version you are trying to install against it's hashes on the website, in order to confirm you have downloaded the correct version?

 

How to check hashes:  https://airvpn.org/faq/software_signatures/

 

Hashes for eddie 64 bit 2.11.2 beta:

 

Windows XP 64 bit

 

Windows XP 64 bit .exe Installer

https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_installer.exe

MD5:  bd38b099b54f68b62e6d3078fb6fa014

SHA1:  a63f65e28299073e22131b94899ba097d842c0f3

SHA256:  059f02809aafbd4a847b8d95b3f5045a19c01d6048a47f99469eb9143e5f9e94

SHA512:  0b0931ff6bb375671c07349b15fc7c5cf16f3b853bc547dda478973c5e454e672f785fe09d8d5322b94a5937e7556611ce158787375068c442b8749e6d6fc2e6

 

 

Windows XP 64 bit .zip Portable

https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_portable.zip

MD5:  d48434efffab71315c03b265ff52501c

SHA1:  592b2161f2c6af89376f1802e5d99b71bce8cc74

SHA256:  a8adf87805fdd4f7f8a6da9125b421312c3ad98f576e5557df0363a06f5b42d4

SHA512:  4d969587c83f6b78e190e051342b7a74e44d3290a445531dc2a1bd1f2f121572ba6fdcab4df88c863259024691da79af0a3a926b95cadbfc34c972839cfa69aa

 

Windows Vista/7 64 bit

 

 

Windows Vista/7 64 bit .exe Installer

https://airvpn.org/repository/experimental/airvpn_windows_x64_installer.exe

MD5:  4ebb09978a25366d04af9c6294f8d34e

SHA1:  5fb3588f37630b9b2e49c378e43ce6dffedb7788

SHA256:  40071b4ab5f8762414d606fbed8823d91d84a522b54818188c02e3d4407cf282

SHA512:  1cc88aa2dcebf325c2083151b3163b0414dd920248b184470f9b01d3a2f0c378208e9f3921aede035e8ece883565d52d8068257387cbab251b8240824ad462bd

 

 

Windows Vista/7 64 bit .zip Portable

https://airvpn.org/repository/experimental/airvpn_windows_x64_portable.zip

MD5:  42d586d66e560f55b7172c55e75633eb

SHA1:  717b150f1135298b851d8f066814ef5eb68999cb

SHA256:  8e189f127990b331598dc37c8425b071e92adc6e846616ae4e7a2d8f424f2d92

SHA512:  8999cce055ab096fa50b0f78759455441e70f94c66fddc995e4b55dd8d6a4e5afef3528eeaecfdf50fce902f8041252a44ff666eacc3d9378c51c21caa79d8b5

 

Windows 8/8.1/10 64 bit

 

Windows 8/8.1/10 64 bit .exe Installer

https://airvpn.org/repository/experimental/airvpn_windows8_x64_installer.exe

MD5:  8a8a320f9bb99dbd3e86683b8c5c2be7

SHA1:  992cc60d732811ddc95aa5c95944438866b3dc74

SHA256:  62531c44265e57f2a3bba38e8d44f48bdee65a511b448b15c60231bb2617549b

SHA512:  e0189fde0c4564f72b0c04c0782b8822791a9fb8d188e61e806df385c757fa8789c1e7ccf7f627a7902dba5ecd02ec68da6ed4dce2d3c886f4be81feb7d5b651

 

 

Windows 8/8.1/10 64 bit .zip Portable

https://airvpn.org/repository/experimental/airvpn_windows8_x64_portable.zip

MD5:  f25f3eb818896b2b02230c5c15ac9132

SHA1:  2c5293745868f49c07c77b62b2e6f208c0af76f0

SHA256:  20692b071a2ca3afef58e7ca337f60863358fa62add70aad55fda7ddfb07c107

SHA512:  639a181210795dd7f9ab4dd65d2bb28ce20d66f25ef46b4d7de6b9755aeb08c2935bc8b298981dc3fb581122f3141052f47d4c736e6abe6cc29a742f841b7500

 

 

-Uncle Hunto

Share this post


Link to post

I can only download the beta when connected to the vpn. When I'm not connected to the vpn I get the stable version and not 2.11.2.

Share this post


Link to post

i also had the issue with the page only downloading the stable version. here is what i did to solve it:

 

1. made sure airvpn.org was allowed in noscript

2. clicked on other versions

3. clicked on experimental

4. selected the 32 bit version even though i want the 64 bit version

5. clicked back on the 64 bit version

6. hit the download button

 

maybe that will help

Share this post


Link to post

Someone having problems with getting the new beta version to show up in their browser could also try opening the page in an incognito/private window, which should load the page without using any previously cached content, thus loading the most recent version.

Share this post


Link to post

 

Wow, the new version 2.11.2 not working on my windows, keep restarting -_- the previous 2.11 working 

Windows WFP, Add rule failed: Unknown interface ID

 

Previous 2.11 was working because the old beta used Windows Firewall by default, the new beta use another new method (WFP).

 

You have an unexpected situation, Eddie doesn't always detect TAP ID to inform WFP to allow the network in NL mode.

This is the issue of @internet_user, LZ1, and andeby.

We are looking for a solution, but at the moment it doesn't occur on any of our lab machines.

 

Feature request.

Add the airvpn exit ip and server name onto MacOS menu bar next to the airvpn icon. this feature could be enabled and disabled from eddie settings.

 

Ok, it will be done in the next build.

 

I noticed that even though Internet Explorer isn't my default browser, Eddie still opens it when you go to the settings in the top left corner and click things such as "Speed Test (Web)". whenever you click a link in the client. It would be nice if it would open it in the default browser :].

 

Eddie opens link in the default browser. Does anyone else have this issue?

 

 

I'm pretty sure I read that this client would now make the send & receive buffer sizes 256kb by default. If so, why is it set to "OpenVPN default"?

 

It's on "Automatic" by default...

 

Maybe the tab should be named Proxy/Tor instead

 

Sounds good.

 

Kind regards

Share this post


Link to post

Would like to report that since I updated to 2.11.2 my torrent speeds seem to be more stable at higher speeds than before (fluctuating between 2-6MB/s on 2.10.3 vs very stable at 6-7MB/s on 2.11.2 RC). I am still on the old 9.0.0.9 TAP-driver on Windows 7 x64. Could this be because of OpenVPN updates?

 

I can also report that the weblinks in Eddie open in Chrome for me, working as intended.

Share this post


Link to post

Hello!

To those who have the issue about a message like

Unknown interface ID

or

Unexpected: NetLock WFP rule doesn't exists

(andeby, internet_user, LZ1)

Please edit your network interface (Control Panel\Network and Internet\Network Connections)
and re-enable the "Internet Protocol Version 6 (TCP/IPv6)" checkbox.
Don't worry, Eddie implements IPv6 lock.
And de-check the flag "Disable IPv6 at OS level if requested" under Settings -> Advanced.

It's still a bug that prevents usage with IPv6 disabled, it will be fixed soon.

 

Kind regards

Share this post


Link to post

Sadly still getting the same error as before even after doing what you suggested. I also tried both with and without IPv6 allowed on the TAP-adapter which made no difference either.

Share this post


Link to post

Sadly still getting the same error as before even after doing what you suggested. I also tried both with and without IPv6 allowed on the TAP-adapter which made no difference either.

Try go to Preferences>Advanced>Uncheck "WPF", click save and then click the Eddie Menu again, where Preferences are and click "Exit". Then restart and see if it works ^^. Because Staffs (kind) suggestion, didn't work for me either, but this did, after I played around with it.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Although I already did have WFP unchecked, clicking Exit and restarting seems to have fixed it. WFP is now working for me as well, thanks!

 

@Staff what exactly does unchecking WFP do/change? Is WFP network lock still in effect if WFP is unchecked?

Share this post


Link to post

^__^ No worries. Thanks to the always hard working Clodo and Air Staff too, even though I'm sure the problem isn't entirely fixed just yet


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Although I already did have WFP unchecked, clicking Exit and restarting seems to have fixed it. WFP is now working for me as well, thanks!

 

@Staff what exactly does unchecking WFP do/change? Is WFP network lock still in effect if WFP is unchecked?

I would assume NL is still on. Now I*m not an expert or anything... But I would assume that if something went wrong with WPF, then NL would switch to using Windows Firewall, as it appears to have done now. I just turned NL on and it works. No errors.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...