Jump to content
Not connected, Your IP: 3.239.2.222
Staff

Eddie 2.11beta available

Recommended Posts

Windows XP Professional 32-bit administrator account & Air VPN experimental portable version.Result is:

 

 

ZorjmGp.jpg

 

Any help appreciated.

Share this post


Link to post

You maybe already know about this but when the WFP is activated, ping doesn't works on the servers (blank latency).

Share this post


Link to post
Guest

You maybe already know about this but when the WFP is activated, ping doesn't works on the servers (blank latency).

It does work. Make sure windows firewall or any firewall you use allows ICMP to airvpn servers.

Share this post


Link to post

I have a suggestion.

I use Windows 10.

When I shut down, your client does not exit.  Many times, I forget to close the client and Windows always asks me to close Eddie.

Could you make the client close when Windows shuts down?

Thank you.

Share this post


Link to post

I have a suggestion.

I use Windows 10.

When I shut down, your client does not exit.  Many times, I forget to close the client and Windows always asks me to close Eddie.

Could you make the client close when Windows shuts down?

Thank you.

 

Preferences > General > Exit confirmation prompt


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

I don't know if this is a problem or not. If not then great 

 

I've been using Mint 18 Cinnamon for a while & KDE recently without any issues. I want to use openSUSE KDE Tumblenose as my main system and have it running in a VM at the moment. I decided to install the beta version into the openSUSE VM and it is working fine as far as I know. However, during the installation I had an issue with 'Signature verification failed'. I retried then ignored it and everything seemed to install ok.

 

linux-srbs:/home/moo/AirVPN # zypper install airvpn_linux_x64_rpm.rpm
Loading repository data...
Reading installed packages...
Resolving package dependencies...

The following 20 NEW packages are going to be installed:
airvpn glib2-devel glibc-devel libgdiplus0 libgdiplus-devel libpcrecpp0 libpcreposix0
libstdc++6-devel-gcc6 libstdc++-devel linux-glibc-devel mono-core mono-data mono-data-sqlite mono-extras
mono-mvc mono-wcf mono-web mono-winforms mono-winfxcore pcre-devel

The following recommended package was automatically selected:
libgdiplus0

20 new packages to install.
Overall download size: 35.5 MiB. Already cached: 0 B. After the operation, additional 157.4 MiB will be
used.
Continue? [y/n/? shows all options] (y): y
Retrieving package linux-glibc-devel-4.7-1.2.noarch (1/20), 1.0 MiB ( 4.5 MiB unpacked)
Retrieving: linux-glibc-devel-4.7-1.2.noarch.rpm .........................................[done (1.0 MiB/s)]
Retrieving package libgdiplus0-3.12-1.5.x86_64 (2/20), 148.9 KiB (428.1 KiB unpacked)
Retrieving: libgdiplus0-3.12-1.5.x86_64.rpm ..............................................[done (1.0 MiB/s)]
Retrieving package libpcrecpp0-8.39-2.2.x86_64 (3/20), 29.9 KiB ( 38.0 KiB unpacked)
Retrieving: libpcrecpp0-8.39-2.2.x86_64.rpm ..........................................................[done]
Retrieving package libpcreposix0-8.39-2.2.x86_64 (4/20), 20.9 KiB ( 10.0 KiB unpacked)
Retrieving: libpcreposix0-8.39-2.2.x86_64.rpm ........................................................[done]
Retrieving package mono-winforms-4.4.2-1.2.x86_64 (5/20), 1.5 MiB ( 5.1 MiB unpacked)
Retrieving: mono-winforms-4.4.2-1.2.x86_64.rpm ...........................................[done (1.2 MiB/s)]
Retrieving package glibc-devel-2.24-1.1.x86_64 (6/20), 777.0 KiB ( 3.0 MiB unpacked)
Retrieving: glibc-devel-2.24-1.1.x86_64.rpm ............................................[done (864.2 KiB/s)]
Retrieving package mono-extras-4.4.2-1.2.x86_64 (7/20), 469.6 KiB ( 1.5 MiB unpacked)
Retrieving: mono-extras-4.4.2-1.2.x86_64.rpm .............................................[done (1.2 MiB/s)]
Retrieving package libstdc++6-devel-gcc6-6.2.1+r239849-1.2.x86_64 (8/20), 6.5 MiB ( 35.0 MiB unpacked)
Retrieving: libstdc++6-devel-gcc6-6.2.1+r239849-1.2.x86_64.rpm ...........................[done (1.2 MiB/s)]
Retrieving package mono-web-4.4.2-1.2.x86_64 (9/20), 2.1 MiB ( 7.7 MiB unpacked)
Retrieving: mono-web-4.4.2-1.2.x86_64.rpm ................................................[done (1.2 MiB/s)]
Retrieving package libstdc++-devel-6-1.19.x86_64 (10/20), 9.6 KiB ( 72 B unpacked)
Retrieving: libstdc++-devel-6-1.19.x86_64.rpm ........................................................[done]
Retrieving package mono-wcf-4.4.2-1.2.x86_64 (11/20), 1019.5 KiB ( 3.4 MiB unpacked)
Retrieving: mono-wcf-4.4.2-1.2.x86_64.rpm ..............................................[done (780.8 KiB/s)]
Retrieving package mono-data-4.4.2-1.2.x86_64 (12/20), 3.7 MiB ( 14.6 MiB unpacked)
Retrieving: mono-data-4.4.2-1.2.x86_64.rpm ...............................................[done (1.2 MiB/s)]
Retrieving package pcre-devel-8.39-2.2.x86_64 (13/20), 229.7 KiB (263.3 KiB unpacked)
Retrieving: pcre-devel-8.39-2.2.x86_64.rpm .............................................[done (300.3 KiB/s)]
Retrieving package mono-core-4.4.2-1.2.x86_64 (14/20), 12.0 MiB ( 47.9 MiB unpacked)
Retrieving: mono-core-4.4.2-1.2.x86_64.rpm ...............................................[done (1.2 MiB/s)]
Retrieving package glib2-devel-2.48.2-1.2.x86_64 (15/20), 1.9 MiB ( 22.4 MiB unpacked)
Retrieving: glib2-devel-2.48.2-1.2.x86_64.rpm ............................................[done (1.2 MiB/s)]
Retrieving package mono-winfxcore-4.4.2-1.2.x86_64 (16/20), 333.6 KiB (838.0 KiB unpacked)
Retrieving: mono-winfxcore-4.4.2-1.2.x86_64.rpm ........................................[done (328.0 KiB/s)]
Retrieving package libgdiplus-devel-3.12-1.5.x86_64 (17/20), 9.8 KiB ( 617 B unpacked)
Retrieving: libgdiplus-devel-3.12-1.5.x86_64.rpm .....................................................[done]
Retrieving package mono-mvc-4.4.2-1.2.x86_64 (18/20), 494.1 KiB ( 1.6 MiB unpacked)
Retrieving: mono-mvc-4.4.2-1.2.x86_64.rpm ............................................................[done]
Retrieving package mono-data-sqlite-4.4.2-1.2.x86_64 (19/20), 145.2 KiB (206.3 KiB unpacked)
Retrieving: mono-data-sqlite-4.4.2-1.2.x86_64.rpm ....................................................[done]
Retrieving package airvpn-2.11-0.x86_64 (20/20), 3.2 MiB ( 8.9 MiB unpacked)
airvpn_linux_x64_rpm.rpm:
Header V4 RSA/SHA1 Signature, key ID cbc01859: NOKEY
V4 RSA/SHA1 Signature, key ID cbc01859: NOKEY

airvpn-2.11-0.x86_64 (Plain RPM files cache): Signature verification failed [4-Signatures public key is not available]
Abort, retry, ignore? [a/r/i] (a): r
Retrieving package airvpn-2.11-0.x86_64 (0/20), 3.2 MiB ( 8.9 MiB unpacked)
airvpn_linux_x64_rpm.rpm:
Header V4 RSA/SHA1 Signature, key ID cbc01859: NOKEY
V4 RSA/SHA1 Signature, key ID cbc01859: NOKEY

airvpn-2.11-0.x86_64 (Plain RPM files cache): Signature verification failed [4-Signatures public key is not available]
Abort, retry, ignore? [a/r/i] (a): i
Checking for file conflicts: .........................................................................[done]
( 1/20) Installing: linux-glibc-devel-4.7-1.2.noarch .................................................[done]
( 2/20) Installing: libgdiplus0-3.12-1.5.x86_64 ......................................................[done]
( 3/20) Installing: libpcrecpp0-8.39-2.2.x86_64 ......................................................[done]
( 4/20) Installing: libpcreposix0-8.39-2.2.x86_64 ....................................................[done]
( 5/20) Installing: mono-winforms-4.4.2-1.2.x86_64 ...................................................[done]
( 6/20) Installing: glibc-devel-2.24-1.1.x86_64 ......................................................[done]
( 7/20) Installing: mono-extras-4.4.2-1.2.x86_64 .....................................................[done]
( 8/20) Installing: libstdc++6-devel-gcc6-6.2.1+r239849-1.2.x86_64 ...................................[done]
( 9/20) Installing: mono-web-4.4.2-1.2.x86_64 ........................................................[done]
(10/20) Installing: libstdc++-devel-6-1.19.x86_64 ....................................................[done]
(11/20) Installing: mono-wcf-4.4.2-1.2.x86_64 ........................................................[done]
(12/20) Installing: mono-data-4.4.2-1.2.x86_64 .......................................................[done]
(13/20) Installing: pcre-devel-8.39-2.2.x86_64 .......................................................[done]
(14/20) Installing: mono-core-4.4.2-1.2.x86_64 .......................................................[done]
Additional rpm output:
Linux Cert Store Sync - version 4.4.2.0
Synchronize local certs with certs from local Linux trust store.
Copyright 2002, 2003 Motus Technologies. Copyright 2004-2008 Novell. BSD licensed.

I already trust 0, your new list has 164
Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2
Certificate added: CN=EBG Elektronik Sertifika Hizmet Sağlayıcısı, O=EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., C=TR
Certificate added: C=ES, O=Agencia Catalana de Certificacio (NIF Q-0801176-I), OU=Serveis Publics de Certificacio, OU=Vegeu https://www.catcert.net/verarrel ©03, OU=Jerarquia Entitats de Certificacio Catalanes, CN=EC-ACC
Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority
Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2
Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE
Certificate added: C=TR, L=Gebze - Kocaeli, O=Türkiye Bilimsel ve Teknolojik Araştırma Kurumu - TÜBİTAK, OU=Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü - UEKAE, OU=Kamu Sertifikasyon Merkezi, CN=TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3
Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2
Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068
Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2
Certificate added: C=DE, O=Deutsche Telekom AG, OU=T-TeleSec Trust Center, CN=Deutsche Telekom Root CA 2
Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign
Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3
Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA
Certificate added: C=US, O=America Online Inc., CN=America Online Root Certification Authority 2
Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA
Certificate added: OU=GlobalSign Root CA - R2, O=GlobalSign, CN=GlobalSign
Certificate added: C=US, O="VeriSign, Inc.", OU=VeriSign Trust Network, OU="© 1999 VeriSign, Inc. - For authorized use only", CN=VeriSign Class 3 Public Primary Certification Authority - G3
Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2
Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign
Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA
Certificate added: C=CN, O=WoSign CA Limited, CN=Certification Authority of WoSign G2
Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1
Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Secure Certificate Services
Certificate added: C=GB, O=Trustis Limited, OU=Trustis FPS Root CA
Certificate added: C=US, O=GTE Corporation, OU="GTE CyberTrust Solutions, Inc.", CN=GTE CyberTrust Global Root
Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3
Certificate added: C=US, O=GeoTrust Inc., OU=© 2008 GeoTrust Inc. - For authorized use only, CN=GeoTrust Primary Certification Authority - G3
Certificate added: C=US, O=GeoTrust Inc., CN=GeoTrust Primary Certification Authority
Certificate added: C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden Root CA - G3
Certificate added: C=ZA, S=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA, E=server-certs@thawte.com
Certificate added: E=pki@sk.ee, C=EE, O=AS Sertifitseerimiskeskus, CN=Juur-SK
Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA
Certificate added: CN=ACEDICOM Root, OU=PKI, O=EDICOM, C=ES
Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=Trusted Certificate Services
Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3
Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="© 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2
Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
Certificate added: C=JP, O="Japan Certification Services, Inc.", CN=SecureSign RootCA11
Certificate added: C=CN, O=CNNIC, CN=CNNIC ROOT
Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tanúsítványkiadók (Certification Services), CN=NetLock Arany (Class Gold) Főtanúsítvány
Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT
Certificate added: C=BM, O=QuoVadis Limited, OU=Root Certification Authority, CN=QuoVadis Root Certification Authority
Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA
Certificate added: C=TR, L=Ankara, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., OU=E-Tugra Sertifikasyon Merkezi, CN=E-Tugra Certification Authority
Certificate added: C=FR, O=Certplus, CN=Class 2 Primary CA
Certificate added: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 2
Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES
Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root
Certificate added: C=US, O="VeriSign, Inc.", OU=VeriSign Trust Network, OU="© 2008 VeriSign, Inc. - For authorized use only", CN=VeriSign Universal Root Certification Authority
Certificate added: L=ValiCert Validation Network, O="ValiCert, Inc.", OU=ValiCert Class 2 Policy Validation Authority, CN=http://www.valicert.com/, E=info@valicert.com
Certificate added: C=US, O=Digital Signature Trust, OU=DST ACES, CN=DST ACES CA X6
Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority
Certificate added: C=EU, L=Madrid (see current address at www.camerfirma.com/address), OID.2.5.4.5=A82743287, O=AC Camerfirma S.A., CN=Global Chambersign Root - 2008
Certificate added: C=US, O="thawte, Inc.", OU="© 2007 thawte, Inc. - For authorized use only", CN=thawte Primary Root CA - G2
Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="© 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3
Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC
Certificate added: C=TR, L=Ankara, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2
Certificate added: C=SE, O=AddTrust AB, OU=AddTrust TTP Network, CN=AddTrust Qualified CA Root
Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=© 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048)
Certificate added: C=EU, O=AC Camerfirma SA CIF A82743287, OU=http://www.chambersign.org, CN=Global Chambersign Root
Certificate added: C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root
Certificate added: C=SE, O=AddTrust AB, OU=AddTrust TTP Network, CN=AddTrust Public CA Root
Certificate added: O=Digital Signature Trust Co., CN=DST Root CA X3
Certificate added: C=US, S=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware
Certificate added: C=CN, O=China Internet Network Information Center, CN=China Internet Network Information Center EV Certificates Root
Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com
Certificate added: L=ValiCert Validation Network, O="ValiCert, Inc.", OU=ValiCert Class 3 Policy Validation Authority, CN=http://www.valicert.com/, E=info@valicert.com
Certificate added: C=JP, O=Japanese Government, OU=ApplicationCA
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA
Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R1
Certificate added: C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden Root CA - G2
Certificate added: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
Certificate added: C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden EV Root CA
Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority
Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1
Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 CA 1
Certificate added: C=FR, O=Certinomis, OU=0002 433998903, CN=Certinomis - Autorité Racine
Certificate added: C=US, O=Equifax Secure Inc., CN=Equifax Secure eBusiness CA-1
Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority
Certificate added: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root CA 1
Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009
Certificate added: C=CH, O=WISeKey, OU=Copyright © 2005, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GA CA
Certificate added: C=ES, O=Generalitat Valenciana, OU=PKIGVA, CN=Root CA Generalitat Valenciana
Certificate added: C=JP, O=SECOM Trust.net, OU=Security Communication RootCA1
Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA
Certificate added: C=US, O="VeriSign, Inc.", OU=VeriSign Trust Network, OU="© 2006 VeriSign, Inc. - For authorized use only", CN=VeriSign Class 3 Public Primary Certification Authority - G5
Certificate added: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OU=e-Szigno CA, CN=Microsec e-Szigno Root CA
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA
Certificate added: C=SE, O=AddTrust AB, OU=AddTrust TTP Network, CN=AddTrust Class 1 CA Root
Certificate added: C=GR, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2011
Certificate added: C=US, O="VeriSign, Inc.", OU=Class 3 Public Primary Certification Authority
Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2
Certificate added: C=TW, O=Government Root Certification Authority
Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority
Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA
Certificate added: C=US, O=Entrust.net, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), OU=© 1999 Entrust.net Limited, CN=Entrust.net Secure Server Certification Authority
Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2
Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009
Certificate added: C=US, O="thawte, Inc.", OU=Certification Services Division, OU="© 2008 thawte, Inc. - For authorized use only", CN=thawte Primary Root CA - G3
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4
Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3
Certificate added: C=CN, O=WoSign CA Limited, CN=CA 沃通根证书
Certificate added: C=EE, O=AS Sertifitseerimiskeskus, CN=EE Certification Centre Root CA, E=pki@sk.ee
Certificate added: C=US, O="VeriSign, Inc.", OU=VeriSign Trust Network, OU="© 1999 VeriSign, Inc. - For authorized use only", CN=VeriSign Class 1 Public Primary Certification Authority - G3
Certificate added: C=EU, O=AC Camerfirma SA CIF A82743287, OU=http://www.chambersign.org, CN=Chambers of Commerce Root
Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign
Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA
Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority
Certificate added: C=FR, O=Dhimyotis, CN=Certigna
Certificate added: C=US, O=VISA, OU=Visa International Service Association, CN=Visa eCommerce Root
Certificate added: E=contacto@procert.net.ve, L=Chacao, S=Miranda, OU=Proveedor de Certificados PROCERT, O=Sistema Nacional de Certificacion Electronica, C=VE, CN=PSCProcert
Certificate added: L=ValiCert Validation Network, O="ValiCert, Inc.", OU=ValiCert Class 1 Policy Validation Authority, CN=http://www.valicert.com/, E=info@valicert.com
Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="© 2006 Entrust, Inc.", CN=Entrust Root Certification Authority
Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1
Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services
Certificate added: C=FR, O=Certinomis, OU=0002 433998903, CN=Certinomis - Root CA
Certificate added: C=US, O=GeoTrust Inc., CN=GeoTrust Universal CA
Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu
Certificate added: C=US, O="thawte, Inc.", OU=Certification Services Division, OU="© 2006 thawte, Inc. - For authorized use only", CN=thawte Primary Root CA
Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA
Certificate added: C=ZA, S=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA, E=premium-server@thawte.com
Certificate added: C=TR, L=Ankara, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5
Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication EV RootCA1
Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2
Certificate added: C=US, O=Wells Fargo WellsSecure, OU=Wells Fargo Bank NA, CN=WellsSecure Public Root Certificate Authority
Certificate added: C=CN, O=WoSign CA Limited, CN=CA WoSign ECC Root
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2
Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3
Certificate added: C=IL, O=StartCom Ltd., CN=StartCom Certification Authority G2
Certificate added: C=HK, O=Hongkong Post, CN=Hongkong Post Root CA 1
Certificate added: C=US, O="VeriSign, Inc.", OU=VeriSign Trust Network, OU="© 2007 VeriSign, Inc. - For authorized use only", CN=VeriSign Class 3 Public Primary Certification Authority - G4
Certificate added: C=US, O=America Online Inc., CN=America Online Root Certification Authority 1
Certificate added: O=RSA Security Inc, OU=RSA Security 2048 V3
Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial
Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2
Certificate added: C=PL, O=Unizeto Sp. z o.o., CN=Certum CA
Certificate added: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı, C=TR, L=Ankara, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. © Aralık 2007
Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium
Certificate added: C=US, O="VeriSign, Inc.", OU=Class 1 Public Primary Certification Authority
Certificate added: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA
Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2
Certificate added: C=US, O=GeoTrust Inc., OU=© 2007 GeoTrust Inc. - For authorized use only, CN=GeoTrust Primary Certification Authority - G2
Certificate added: C=US, O=Network Solutions L.L.C., CN=Network Solutions Certificate Authority
Certificate added: C=US, O=Equifax, OU=Equifax Secure Certificate Authority
Certificate added: C=ch, O=Swisscom, OU=Digital Certificate Services, CN=Swisscom Root EV CA 2
Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority
Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking
Certificate added: C=EU, L=Madrid (see current address at www.camerfirma.com/address), OID.2.5.4.5=A82743287, O=AC Camerfirma S.A., CN=Chambers of Commerce Root - 2008
Certificate added: C=CN, O=WoSign CA Limited, CN=Certification Authority of WoSign
Certificate added: C=US, O=GeoTrust Inc., CN=GeoTrust Global CA 2
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2
Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3
Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA
Certificate added: C=US, O=GeoTrust Inc., CN=GeoTrust Universal CA 2
Certificate added: O="Cybertrust, Inc", CN=Cybertrust Global Root
Certificate added: C=FI, O=Sonera, CN=Sonera Class2 CA
Certificate added: C=FR, S=France, L=Paris, O=PM/SGDN, OU=DCSSI, CN=IGC/A, E=igca@sgdn.pm.gouv.fr
164 new root certificates were added to your trust store.
Import process completed.


(15/20) Installing: glib2-devel-2.48.2-1.2.x86_64 ....................................................[done]
(16/20) Installing: mono-winfxcore-4.4.2-1.2.x86_64 ..................................................[done]
(17/20) Installing: libgdiplus-devel-3.12-1.5.x86_64 .................................................[done]
(18/20) Installing: mono-mvc-4.4.2-1.2.x86_64 ........................................................[done]
(19/20) Installing: mono-data-sqlite-4.4.2-1.2.x86_64 ................................................[done]
(20/20) Installing: airvpn-2.11-0.x86_64 .............................................................[done]
Additional rpm output:
warning: /var/cache/zypp/packages/_tmpRPMcache_/airvpn_linux_x64_rpm.rpm: Header V4 RSA/SHA1 Signature, key ID cbc01859: NOKEY


linux-srbs:/home/moo/AirVPN # exit
exit
moo@linux-srbs:~/AirVPN>

Share this post


Link to post

@hugomueller

They could use things such as:

  1. Full logs from Eddie, so we can see how it operates for you.
  2. System logs (available if you click the lifebelt icon in the Eddie logs area)
  3. Other information on your system, such as if you use any third-party firewalls or software which might interfere.
  4. What you've tried, in order to fix it. Such as if it still persists, if you make Eddie use "Windows Firewall" instead of WFP, in the settings.
  5. Deeper description of the problem, such as what steps you took to make the problem occur, so that Air can try reproduce it.
  6. What exactly the problem *is*. Is it just an error in the logs for instance? Or does your PC go full-BSOD? Deeper descriptions, not just pictures.

All with appropriate spoiler tags of course. There's lots you can do


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Eddie Beta really struggles with changing servers for me. I have to actually disable Ethernet 2 and enable it again, to make it connect, because the interface hacks aren't working. It works fine once it gets connected however. I'm not using Network Lock either, although when I do, I do usually run into problems with this Beta - stuff about not being able to find the default gateway or something. At least Check Tunnel & DNS routes are working. This is on Windows 8.1 64-bit.

 

. 2016.09.29 20:07:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 20:07:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.29 20:07:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 20:07:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.29 20:08:04 - Updating systems & servers data ...
. 2016.09.29 20:08:05 - Systems & servers data update completed
. 2016.09.29 20:18:07 - Updating systems & servers data ...
. 2016.09.29 20:18:08 - Systems & servers data update completed
. 2016.09.29 20:28:10 - Updating systems & servers data ...
. 2016.09.29 20:28:14 - Systems & servers data update completed
. 2016.09.29 20:38:16 - Updating systems & servers data ...
. 2016.09.29 20:38:17 - Systems & servers data update completed
. 2016.09.29 20:48:19 - Updating systems & servers data ...
. 2016.09.29 20:48:20 - Systems & servers data update completed
. 2016.09.29 20:58:21 - Updating systems & servers data ...
. 2016.09.29 20:58:21 - Systems & servers data update completed
. 2016.09.29 21:07:44 - OpenVPN > TLS: soft reset sec=0 bytes=141928170/0 pkts=194136/0
. 2016.09.29 21:07:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.29 21:07:44 - OpenVPN > Validating certificate key usage
. 2016.09.29 21:07:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.29 21:07:44 - OpenVPN > VERIFY KU OK
. 2016.09.29 21:07:44 - OpenVPN > Validating certificate extended key usage
. 2016.09.29 21:07:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.29 21:07:44 - OpenVPN > VERIFY EKU OK
. 2016.09.29 21:07:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.29 21:07:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.29 21:07:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 21:07:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.29 21:07:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 21:07:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.29 21:08:23 - Updating systems & servers data ...
. 2016.09.29 21:08:23 - Systems & servers data update completed
. 2016.09.29 21:18:26 - Updating systems & servers data ...
. 2016.09.29 21:18:26 - Systems & servers data update completed
. 2016.09.29 21:28:29 - Updating systems & servers data ...
. 2016.09.29 21:28:29 - Systems & servers data update completed
. 2016.09.29 21:38:31 - Updating systems & servers data ...
. 2016.09.29 21:38:32 - Systems & servers data update completed
. 2016.09.29 21:48:33 - Updating systems & servers data ...
. 2016.09.29 21:48:34 - Systems & servers data update completed
. 2016.09.29 21:58:36 - Updating systems & servers data ...
. 2016.09.29 21:58:36 - Systems & servers data update completed
. 2016.09.29 22:07:44 - OpenVPN > TLS: soft reset sec=0 bytes=127273410/0 pkts=186931/0
. 2016.09.29 22:07:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.29 22:07:44 - OpenVPN > Validating certificate key usage
. 2016.09.29 22:07:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.29 22:07:44 - OpenVPN > VERIFY KU OK
. 2016.09.29 22:07:44 - OpenVPN > Validating certificate extended key usage
. 2016.09.29 22:07:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.29 22:07:44 - OpenVPN > VERIFY EKU OK
. 2016.09.29 22:07:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.29 22:07:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.29 22:07:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 22:07:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.29 22:07:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 22:07:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.29 22:08:39 - Updating systems & servers data ...
. 2016.09.29 22:08:39 - Systems & servers data update completed
. 2016.09.29 22:18:42 - Updating systems & servers data ...
. 2016.09.29 22:18:42 - Systems & servers data update completed
. 2016.09.29 22:28:45 - Updating systems & servers data ...
. 2016.09.29 22:28:45 - Systems & servers data update completed
. 2016.09.29 22:38:47 - Updating systems & servers data ...
. 2016.09.29 22:38:48 - Systems & servers data update completed
. 2016.09.29 22:48:50 - Updating systems & servers data ...
. 2016.09.29 22:48:51 - Systems & servers data update completed
. 2016.09.29 22:58:53 - Updating systems & servers data ...
. 2016.09.29 22:58:54 - Systems & servers data update completed
. 2016.09.29 23:07:44 - OpenVPN > TLS: soft reset sec=0 bytes=181344205/0 pkts=224476/0
. 2016.09.29 23:07:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.29 23:07:44 - OpenVPN > Validating certificate key usage
. 2016.09.29 23:07:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.29 23:07:44 - OpenVPN > VERIFY KU OK
. 2016.09.29 23:07:44 - OpenVPN > Validating certificate extended key usage
. 2016.09.29 23:07:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.29 23:07:44 - OpenVPN > VERIFY EKU OK
. 2016.09.29 23:07:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.29 23:07:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.29 23:07:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 23:07:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.29 23:07:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.29 23:07:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.29 23:08:56 - Updating systems & servers data ...
. 2016.09.29 23:08:57 - Systems & servers data update completed
. 2016.09.29 23:18:59 - Updating systems & servers data ...
. 2016.09.29 23:18:59 - Systems & servers data update completed
. 2016.09.29 23:29:02 - Updating systems & servers data ...
. 2016.09.29 23:29:02 - Systems & servers data update completed
. 2016.09.29 23:39:05 - Updating systems & servers data ...
. 2016.09.29 23:39:05 - Systems & servers data update completed
. 2016.09.29 23:49:07 - Updating systems & servers data ...
. 2016.09.29 23:49:08 - Systems & servers data update completed
. 2016.09.29 23:59:09 - Updating systems & servers data ...
. 2016.09.29 23:59:09 - Systems & servers data update completed
I 2016.09.30 00:07:44 - Renewing TLS key
. 2016.09.30 00:07:44 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.09.30 00:07:45 - OpenVPN > TLS: soft reset sec=0 bytes=123098694/0 pkts=163290/0
. 2016.09.30 00:07:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 00:07:45 - OpenVPN > Validating certificate key usage
. 2016.09.30 00:07:45 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 00:07:45 - OpenVPN > VERIFY KU OK
. 2016.09.30 00:07:45 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 00:07:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 00:07:45 - OpenVPN > VERIFY EKU OK
. 2016.09.30 00:07:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 00:07:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 00:07:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 00:07:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 00:07:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 00:07:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 00:09:10 - Updating systems & servers data ...
. 2016.09.30 00:09:11 - Systems & servers data update completed
. 2016.09.30 00:19:12 - Updating systems & servers data ...
. 2016.09.30 00:19:13 - Systems & servers data update completed
. 2016.09.30 00:29:15 - Updating systems & servers data ...
. 2016.09.30 00:29:16 - Systems & servers data update completed
. 2016.09.30 00:39:18 - Updating systems & servers data ...
. 2016.09.30 00:39:19 - Systems & servers data update completed
. 2016.09.30 00:49:21 - Updating systems & servers data ...
. 2016.09.30 00:49:22 - Systems & servers data update completed
. 2016.09.30 00:59:24 - Updating systems & servers data ...
. 2016.09.30 00:59:24 - Systems & servers data update completed
. 2016.09.30 01:07:45 - OpenVPN > TLS: soft reset sec=0 bytes=93039120/0 pkts=152931/0
. 2016.09.30 01:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 01:07:47 - OpenVPN > Validating certificate key usage
. 2016.09.30 01:07:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 01:07:47 - OpenVPN > VERIFY KU OK
. 2016.09.30 01:07:47 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 01:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 01:07:47 - OpenVPN > VERIFY EKU OK
. 2016.09.30 01:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 01:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 01:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 01:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 01:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 01:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 01:09:27 - Updating systems & servers data ...
. 2016.09.30 01:09:27 - Systems & servers data update completed
. 2016.09.30 01:19:29 - Updating systems & servers data ...
. 2016.09.30 01:19:30 - Systems & servers data update completed
. 2016.09.30 01:29:31 - Updating systems & servers data ...
. 2016.09.30 01:29:31 - Systems & servers data update completed
. 2016.09.30 01:39:32 - Updating systems & servers data ...
. 2016.09.30 01:39:33 - Systems & servers data update completed
. 2016.09.30 01:49:34 - Updating systems & servers data ...
. 2016.09.30 01:49:35 - Systems & servers data update completed
. 2016.09.30 01:59:37 - Updating systems & servers data ...
. 2016.09.30 01:59:38 - Systems & servers data update completed
I 2016.09.30 02:07:45 - Renewing TLS key
. 2016.09.30 02:07:45 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.09.30 02:07:47 - OpenVPN > TLS: soft reset sec=0 bytes=103286547/0 pkts=151960/0
. 2016.09.30 02:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 02:07:47 - OpenVPN > Validating certificate key usage
. 2016.09.30 02:07:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 02:07:47 - OpenVPN > VERIFY KU OK
. 2016.09.30 02:07:47 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 02:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 02:07:47 - OpenVPN > VERIFY EKU OK
. 2016.09.30 02:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 02:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 02:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 02:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 02:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 02:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 02:09:40 - Updating systems & servers data ...
. 2016.09.30 02:09:41 - Systems & servers data update completed
. 2016.09.30 02:19:43 - Updating systems & servers data ...
. 2016.09.30 02:19:44 - Systems & servers data update completed
. 2016.09.30 02:29:46 - Updating systems & servers data ...
. 2016.09.30 02:29:47 - Systems & servers data update completed
. 2016.09.30 02:39:49 - Updating systems & servers data ...
. 2016.09.30 02:39:50 - Systems & servers data update completed
. 2016.09.30 02:49:51 - Updating systems & servers data ...
. 2016.09.30 02:49:52 - Systems & servers data update completed
. 2016.09.30 02:59:53 - Updating systems & servers data ...
. 2016.09.30 02:59:54 - Systems & servers data update completed
. 2016.09.30 03:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 03:07:47 - OpenVPN > Validating certificate key usage
. 2016.09.30 03:07:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 03:07:47 - OpenVPN > VERIFY KU OK
. 2016.09.30 03:07:47 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 03:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 03:07:47 - OpenVPN > VERIFY EKU OK
. 2016.09.30 03:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 03:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 03:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 03:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 03:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 03:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 03:09:54 - Updating systems & servers data ...
. 2016.09.30 03:09:55 - Systems & servers data update completed
. 2016.09.30 03:19:56 - Updating systems & servers data ...
. 2016.09.30 03:19:56 - Systems & servers data update completed
. 2016.09.30 03:29:57 - Updating systems & servers data ...
. 2016.09.30 03:29:58 - Systems & servers data update completed
. 2016.09.30 03:39:59 - Updating systems & servers data ...
. 2016.09.30 03:39:59 - Systems & servers data update completed
. 2016.09.30 03:50:00 - Updating systems & servers data ...
. 2016.09.30 03:50:00 - Systems & servers data update completed
. 2016.09.30 04:00:02 - Updating systems & servers data ...
. 2016.09.30 04:00:02 - Systems & servers data update completed
. 2016.09.30 04:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 04:07:47 - OpenVPN > Validating certificate key usage
. 2016.09.30 04:07:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 04:07:47 - OpenVPN > VERIFY KU OK
. 2016.09.30 04:07:47 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 04:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 04:07:47 - OpenVPN > VERIFY EKU OK
. 2016.09.30 04:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 04:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 04:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 04:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 04:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 04:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 04:10:03 - Updating systems & servers data ...
. 2016.09.30 04:10:03 - Systems & servers data update completed
. 2016.09.30 04:20:05 - Updating systems & servers data ...
. 2016.09.30 04:20:05 - Systems & servers data update completed
. 2016.09.30 04:30:07 - Updating systems & servers data ...
. 2016.09.30 04:30:07 - Systems & servers data update completed
. 2016.09.30 04:40:08 - Updating systems & servers data ...
. 2016.09.30 04:40:08 - Systems & servers data update completed
. 2016.09.30 04:50:11 - Updating systems & servers data ...
. 2016.09.30 04:50:11 - Systems & servers data update completed
. 2016.09.30 05:00:14 - Updating systems & servers data ...
. 2016.09.30 05:00:14 - Systems & servers data update completed
I 2016.09.30 05:07:46 - Renewing TLS key
. 2016.09.30 05:07:46 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.09.30 05:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 05:07:47 - OpenVPN > Validating certificate key usage
. 2016.09.30 05:07:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 05:07:47 - OpenVPN > VERIFY KU OK
. 2016.09.30 05:07:47 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 05:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 05:07:47 - OpenVPN > VERIFY EKU OK
. 2016.09.30 05:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 05:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 05:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 05:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 05:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 05:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 05:10:17 - Updating systems & servers data ...
. 2016.09.30 05:10:17 - Systems & servers data update completed
. 2016.09.30 05:20:19 - Updating systems & servers data ...
. 2016.09.30 05:20:20 - Systems & servers data update completed
. 2016.09.30 05:30:22 - Updating systems & servers data ...
. 2016.09.30 05:30:22 - Systems & servers data update completed
. 2016.09.30 05:40:25 - Updating systems & servers data ...
. 2016.09.30 05:40:25 - Systems & servers data update completed
. 2016.09.30 05:50:27 - Updating systems & servers data ...
. 2016.09.30 05:50:28 - Systems & servers data update completed
. 2016.09.30 05:56:05 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2016.09.30 05:56:05 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.162.180 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 05:56:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 05:56:05 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2016.09.30 05:56:05 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.09.30 05:56:05 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.09.30 05:56:05 - OpenVPN > Route deletion fallback to route.exe
. 2016.09.30 05:56:05 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem
. 2016.09.30 05:56:05 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2016.09.30 05:56:05 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.09.30 14:41:42 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.09.30 14:41:42 - OpenVPN > Route deletion fallback to route.exe
. 2016.09.30 14:41:42 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem
. 2016.09.30 14:41:42 - OpenVPN > Closing TUN/TAP interface
. 2016.09.30 14:41:42 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2016.09.30 14:41:42 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.09.30 14:41:42 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.09.30 14:41:42 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.09.30 14:41:42 - OpenVPN > Restart pause, 10 second(s)
. 2016.09.30 14:41:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.09.30 14:41:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.09.30 14:41:42 - OpenVPN > UDPv4 link local: [undef]
. 2016.09.30 14:41:42 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.180:443
! 2016.09.30 14:41:42 - Disconnecting
. 2016.09.30 14:41:42 - Management - Send 'signal SIGTERM'
. 2016.09.30 14:41:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.09.30 14:41:42 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.09.30 14:41:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.180:443, sid=5e9c04bd 0c7fa0cf
. 2016.09.30 14:41:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 14:41:43 - OpenVPN > Validating certificate key usage
. 2016.09.30 14:41:43 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 14:41:43 - OpenVPN > VERIFY KU OK
. 2016.09.30 14:41:43 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 14:41:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 14:41:43 - OpenVPN > VERIFY EKU OK
. 2016.09.30 14:41:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 14:41:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 14:41:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 14:41:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 14:41:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.180:443
. 2016.09.30 14:41:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.09.30 14:41:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.09.30 14:41:47 - Connection terminated.
I 2016.09.30 14:41:47 - DNS leak protection with packet filtering disabled.
I 2016.09.30 14:41:54 - Checking authorization ...
! 2016.09.30 14:41:54 - Connecting to Hassaleh (Netherlands, Alblasserdam)
. 2016.09.30 14:41:55 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.09.30 14:41:55 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.09.30 14:41:55 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.09.30 14:41:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.09.30 14:41:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.09.30 14:41:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.09.30 14:41:55 - OpenVPN > UDPv4 link local: [undef]
. 2016.09.30 14:41:55 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.39:443
. 2016.09.30 14:41:55 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.39:443, sid=b697ed81 2127c08e
. 2016.09.30 14:41:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 14:41:55 - OpenVPN > Validating certificate key usage
. 2016.09.30 14:41:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 14:41:55 - OpenVPN > VERIFY KU OK
. 2016.09.30 14:41:55 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 14:41:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 14:41:55 - OpenVPN > VERIFY EKU OK
. 2016.09.30 14:41:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 14:41:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 14:41:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 14:41:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 14:41:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 14:41:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.39:443
. 2016.09.30 14:41:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.09.30 14:41:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.138 255.255.0.0'
. 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.09.30 14:41:57 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af
. 2016.09.30 14:41:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.09.30 14:41:57 - OpenVPN > open_tun, tt->ipv6=0
. 2016.09.30 14:41:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap
. 2016.09.30 14:41:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.09.30 14:41:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.138/255.255.0.0 [sUCCEEDED]
. 2016.09.30 14:41:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.138/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.09.30 14:41:57 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A}
. 2016.09.30 14:42:02 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 14:42:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 14:42:02 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 14:42:04 - Updating systems & servers data ...
. 2016.09.30 14:42:04 - Systems & servers data update completed
. 2016.09.30 14:42:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.09.30 14:42:07 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.161.39 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 14:42:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 14:42:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 14:42:07 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 14:42:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 14:42:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 14:42:07 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 14:42:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 14:42:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 14:42:07 - Starting Management Interface
. 2016.09.30 14:42:07 - OpenVPN > Initialization Sequence Completed
I 2016.09.30 14:42:07 - DNS leak protection with packet filtering enabled.
I 2016.09.30 14:42:07 - Flushing DNS
I 2016.09.30 14:42:08 - Checking route
I 2016.09.30 14:42:08 - Checking DNS
! 2016.09.30 14:42:08 - Connected.
. 2016.09.30 14:42:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.09.30 14:42:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.09.30 14:52:07 - Updating systems & servers data ...
. 2016.09.30 14:52:07 - Systems & servers data update completed
. 2016.09.30 15:02:10 - Updating systems & servers data ...
. 2016.09.30 15:02:10 - Systems & servers data update completed
. 2016.09.30 15:12:13 - Updating systems & servers data ...
. 2016.09.30 15:12:13 - Systems & servers data update completed
. 2016.09.30 15:22:16 - Updating systems & servers data ...
. 2016.09.30 15:22:16 - Systems & servers data update completed
. 2016.09.30 15:32:19 - Updating systems & servers data ...
. 2016.09.30 15:32:19 - Systems & servers data update completed
. 2016.09.30 15:41:55 - OpenVPN > TLS: soft reset sec=0 bytes=27746944/0 pkts=35637/0
. 2016.09.30 15:41:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 15:41:55 - OpenVPN > Validating certificate key usage
. 2016.09.30 15:41:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 15:41:55 - OpenVPN > VERIFY KU OK
. 2016.09.30 15:41:55 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 15:41:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 15:41:55 - OpenVPN > VERIFY EKU OK
. 2016.09.30 15:41:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 15:41:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 15:41:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 15:41:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 15:41:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 15:41:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 15:42:22 - Updating systems & servers data ...
. 2016.09.30 15:42:22 - Systems & servers data update completed
. 2016.09.30 15:52:25 - Updating systems & servers data ...
. 2016.09.30 15:52:25 - Systems & servers data update completed
. 2016.09.30 16:02:28 - Updating systems & servers data ...
. 2016.09.30 16:02:28 - Systems & servers data update completed
! 2016.09.30 16:07:18 - Disconnecting
. 2016.09.30 16:07:18 - Management - Send 'signal SIGTERM'
. 2016.09.30 16:07:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.09.30 16:07:18 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.09.30 16:07:23 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.161.39 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 16:07:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:07:23 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:07:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:07:23 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:07:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:07:23 - OpenVPN > Closing TUN/TAP interface
. 2016.09.30 16:07:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.09.30 16:07:23 - Connection terminated.
I 2016.09.30 16:07:23 - DNS leak protection with packet filtering disabled.
I 2016.09.30 16:07:26 - Checking authorization ...
! 2016.09.30 16:07:26 - Connecting to Jabbah (Netherlands, Alblasserdam)
. 2016.09.30 16:07:26 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.09.30 16:07:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.09.30 16:07:26 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.09.30 16:07:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.09.30 16:07:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.09.30 16:07:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:07:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:07:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.09.30 16:07:26 - OpenVPN > UDPv4 link local: [undef]
. 2016.09.30 16:07:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.108:443
. 2016.09.30 16:07:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.108:443, sid=323c8b75 346037e7
. 2016.09.30 16:07:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 16:07:26 - OpenVPN > Validating certificate key usage
. 2016.09.30 16:07:26 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 16:07:26 - OpenVPN > VERIFY KU OK
. 2016.09.30 16:07:26 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 16:07:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 16:07:26 - OpenVPN > VERIFY EKU OK
. 2016.09.30 16:07:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 16:07:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:07:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:07:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:07:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:07:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 16:07:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.108:443
. 2016.09.30 16:07:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.09.30 16:07:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.55.181 255.255.0.0'
. 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.09.30 16:07:29 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af
. 2016.09.30 16:07:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.09.30 16:07:29 - OpenVPN > open_tun, tt->ipv6=0
. 2016.09.30 16:07:29 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap
. 2016.09.30 16:07:29 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.09.30 16:07:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.55.181/255.255.0.0 [sUCCEEDED]
. 2016.09.30 16:07:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.55.181/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.09.30 16:07:29 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A}
. 2016.09.30 16:07:34 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:34 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:39 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:39 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:40 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:41 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:42 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:44 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:45 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:45 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:46 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:47 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:47 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:48 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:49 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:49 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:50 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:50 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:51 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:51 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:53 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:54 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:55 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:56 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:56 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:56 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:57 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:57 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:57 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:58 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:59 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:07:59 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:07:59 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:07:59 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:00 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:00 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:01 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:01 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:01 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:02 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:02 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:03 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:03 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:03 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:04 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:04 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.162.108 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 16:08:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:08:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:04 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:08:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:08:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:04 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:08:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:08:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:04 - OpenVPN > SYSTEM ROUTING TABLE
. 2016.09.30 16:08:04 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.0.1 p=0 i=8 t=4 pr=3 a=522062 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 10.4.0.0 255.255.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5160 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 10.4.64.138 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5160 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 10.4.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5160 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 192.168.0.0 255.255.255.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=522062 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 192.168.0.20 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522062 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 192.168.0.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522062 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 213.152.162.108 255.255.255.255 192.168.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=782042 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 224.0.0.0 240.0.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5182 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=782042 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > 255.255.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5182 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:04 - OpenVPN > SYSTEM ADAPTER LIST
. 2016.09.30 16:08:04 - OpenVPN > TAP-Windows Adapter V9
. 2016.09.30 16:08:04 - OpenVPN >   Index = 11
. 2016.09.30 16:08:04 - OpenVPN >   GUID = {BE0992A2-DAD5-4D63-AF1E-0713A909C21A}
. 2016.09.30 16:08:04 - OpenVPN >   IP = 10.4.64.138/255.255.0.0
. 2016.09.30 16:08:04 - OpenVPN >   MAC = 00:ff:be:09:92:a2
. 2016.09.30 16:08:04 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   DHCP SERV = 10.4.255.254/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 14:42:04 2016
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Sep 30 14:42:04 2017
. 2016.09.30 16:08:04 - OpenVPN >   DNS SERV = 10.4.0.1/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN > Microsoft Hosted Network Virtual Adapter
. 2016.09.30 16:08:04 - OpenVPN >   Index = 10
. 2016.09.30 16:08:04 - OpenVPN >   GUID = {844568C3-14DF-41E6-833A-81856D3B6138}
. 2016.09.30 16:08:04 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.09.30 16:08:04 - OpenVPN >   MAC = a2:88:69:9d:df:af
. 2016.09.30 16:08:04 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   DHCP SERV =
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 16:08:04 2016
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Sep 30 16:08:04 2016
. 2016.09.30 16:08:04 - OpenVPN >   DNS SERV =
. 2016.09.30 16:08:04 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter
. 2016.09.30 16:08:04 - OpenVPN >   Index = 9
. 2016.09.30 16:08:04 - OpenVPN >   GUID = {2D182CF7-D6F3-4AA0-883E-7E68BB203082}
. 2016.09.30 16:08:04 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.09.30 16:08:04 - OpenVPN >   MAC = a0:88:69:9d:df:b0
. 2016.09.30 16:08:04 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   DHCP SERV =
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 16:08:04 2016
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Sep 30 16:08:04 2016
. 2016.09.30 16:08:04 - OpenVPN >   DNS SERV =
. 2016.09.30 16:08:04 - OpenVPN > Intel® Dual Band Wireless-AC 3160
. 2016.09.30 16:08:04 - OpenVPN >   Index = 8
. 2016.09.30 16:08:04 - OpenVPN >   GUID = {6B6DDE14-4361-45B9-8A2D-2C1900101038}
. 2016.09.30 16:08:04 - OpenVPN >   IP = 192.168.0.20/255.255.255.0
. 2016.09.30 16:08:04 - OpenVPN >   MAC = a0:88:69:9d:df:af
. 2016.09.30 16:08:04 - OpenVPN >   GATEWAY = 192.168.0.1/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   DHCP SERV = 192.168.0.1/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 14:41:46 2016
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Oct 01 14:41:46 2016
. 2016.09.30 16:08:04 - OpenVPN >   DNS SERV = 194.168.4.100/255.255.255.255 194.168.8.100/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN > Realtek PCIe GBE Family Controller
. 2016.09.30 16:08:04 - OpenVPN >   Index = 3
. 2016.09.30 16:08:04 - OpenVPN >   GUID = {53B8A3BA-3F04-479E-B626-2647DA5C2E82}
. 2016.09.30 16:08:04 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.09.30 16:08:04 - OpenVPN >   MAC = f8:a9:63:47:09:c1
. 2016.09.30 16:08:04 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   DHCP SERV =
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 16:08:04 2016
. 2016.09.30 16:08:04 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Sep 30 16:08:04 2016
. 2016.09.30 16:08:04 - OpenVPN >   PRI WINS = 150.100.0.10/255.255.255.255
. 2016.09.30 16:08:04 - OpenVPN >   SEC WINS =
. 2016.09.30 16:08:04 - OpenVPN >   DNS SERV =
. 2016.09.30 16:08:04 - Starting Management Interface
. 2016.09.30 16:08:04 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
I 2016.09.30 16:08:04 - DNS leak protection with packet filtering enabled.
I 2016.09.30 16:08:04 - Flushing DNS
. 2016.09.30 16:08:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.09.30 16:08:04 - Disconnecting
. 2016.09.30 16:08:04 - Management - Send 'signal SIGTERM'
. 2016.09.30 16:08:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.09.30 16:08:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.09.30 16:08:04 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.09.30 16:08:09 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.162.108 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 16:08:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:09 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:08:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:09 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:08:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:09 - OpenVPN > Closing TUN/TAP interface
. 2016.09.30 16:08:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.09.30 16:08:09 - Connection terminated.
I 2016.09.30 16:08:09 - DNS leak protection with packet filtering disabled.
I 2016.09.30 16:08:18 - Checking authorization ...
! 2016.09.30 16:08:19 - Connecting to Hyadum (Netherlands, Alblasserdam)
. 2016.09.30 16:08:19 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.09.30 16:08:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.09.30 16:08:19 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.09.30 16:08:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.09.30 16:08:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.09.30 16:08:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:08:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:08:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.09.30 16:08:19 - OpenVPN > UDPv4 link local: [undef]
. 2016.09.30 16:08:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.34:443
. 2016.09.30 16:08:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.34:443, sid=1b679b7f 2263fd39
. 2016.09.30 16:08:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 16:08:19 - OpenVPN > Validating certificate key usage
. 2016.09.30 16:08:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 16:08:19 - OpenVPN > VERIFY KU OK
. 2016.09.30 16:08:19 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 16:08:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 16:08:19 - OpenVPN > VERIFY EKU OK
. 2016.09.30 16:08:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 16:08:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:08:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:08:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:08:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:08:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 16:08:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.34:443
. 2016.09.30 16:08:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.09.30 16:08:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.99 255.255.0.0'
. 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.09.30 16:08:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af
. 2016.09.30 16:08:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.09.30 16:08:22 - OpenVPN > open_tun, tt->ipv6=0
. 2016.09.30 16:08:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap
. 2016.09.30 16:08:22 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.09.30 16:08:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.99/255.255.0.0 [sUCCEEDED]
. 2016.09.30 16:08:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.99/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.09.30 16:08:22 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A}
. 2016.09.30 16:08:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:26 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:31 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:31 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:32 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:32 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:32 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:33 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:33 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:34 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:34 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:35 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:35 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:35 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:36 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:36 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:36 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:37 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:38 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:39 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:39 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:40 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:41 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:42 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:43 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:43 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:43 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:44 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:46 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:47 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:47 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:48 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:49 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:49 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:50 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:50 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:51 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:51 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:53 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:54 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:08:55 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:08:56 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:08:56 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.161.34 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 16:08:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:08:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:56 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:08:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:08:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:56 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:08:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:08:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:08:56 - OpenVPN > SYSTEM ROUTING TABLE
. 2016.09.30 16:08:56 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.0.1 p=0 i=8 t=4 pr=3 a=522115 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 10.4.0.0 255.255.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5212 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 10.4.64.138 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5212 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 10.4.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5212 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 192.168.0.0 255.255.255.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=522115 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 192.168.0.20 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522115 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 192.168.0.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522115 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 213.152.161.34 255.255.255.255 192.168.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=782095 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 224.0.0.0 240.0.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5234 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=782095 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > 255.255.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5234 h=0 m=276/0/0/0/0
. 2016.09.30 16:08:56 - OpenVPN > SYSTEM ADAPTER LIST
. 2016.09.30 16:08:56 - OpenVPN > TAP-Windows Adapter V9
. 2016.09.30 16:08:56 - OpenVPN >   Index = 11
. 2016.09.30 16:08:56 - OpenVPN >   GUID = {BE0992A2-DAD5-4D63-AF1E-0713A909C21A}
. 2016.09.30 16:08:56 - OpenVPN >   IP = 10.4.64.138/255.255.0.0
. 2016.09.30 16:08:56 - OpenVPN >   MAC = 00:ff:be:09:92:a2
. 2016.09.30 16:08:56 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   DHCP SERV = 10.4.255.254/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 14:42:04 2016
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Sep 30 14:42:04 2017
. 2016.09.30 16:08:56 - OpenVPN >   DNS SERV = 10.4.0.1/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN > Microsoft Hosted Network Virtual Adapter
. 2016.09.30 16:08:56 - OpenVPN >   Index = 10
. 2016.09.30 16:08:56 - OpenVPN >   GUID = {844568C3-14DF-41E6-833A-81856D3B6138}
. 2016.09.30 16:08:56 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.09.30 16:08:56 - OpenVPN >   MAC = a2:88:69:9d:df:af
. 2016.09.30 16:08:56 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   DHCP SERV =
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 16:08:56 2016
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Sep 30 16:08:56 2016
. 2016.09.30 16:08:56 - OpenVPN >   DNS SERV =
. 2016.09.30 16:08:56 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter
. 2016.09.30 16:08:56 - OpenVPN >   Index = 9
. 2016.09.30 16:08:56 - OpenVPN >   GUID = {2D182CF7-D6F3-4AA0-883E-7E68BB203082}
. 2016.09.30 16:08:56 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.09.30 16:08:56 - OpenVPN >   MAC = a0:88:69:9d:df:b0
. 2016.09.30 16:08:56 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   DHCP SERV =
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 16:08:56 2016
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Sep 30 16:08:56 2016
. 2016.09.30 16:08:56 - OpenVPN >   DNS SERV =
. 2016.09.30 16:08:56 - OpenVPN > Intel® Dual Band Wireless-AC 3160
. 2016.09.30 16:08:56 - OpenVPN >   Index = 8
. 2016.09.30 16:08:56 - OpenVPN >   GUID = {6B6DDE14-4361-45B9-8A2D-2C1900101038}
. 2016.09.30 16:08:56 - OpenVPN >   IP = 192.168.0.20/255.255.255.0
. 2016.09.30 16:08:56 - OpenVPN >   MAC = a0:88:69:9d:df:af
. 2016.09.30 16:08:56 - OpenVPN >   GATEWAY = 192.168.0.1/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   DHCP SERV = 192.168.0.1/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 14:41:46 2016
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Oct 01 14:41:46 2016
. 2016.09.30 16:08:56 - OpenVPN >   DNS SERV = 194.168.4.100/255.255.255.255 194.168.8.100/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN > Realtek PCIe GBE Family Controller
. 2016.09.30 16:08:56 - OpenVPN >   Index = 3
. 2016.09.30 16:08:56 - OpenVPN >   GUID = {53B8A3BA-3F04-479E-B626-2647DA5C2E82}
. 2016.09.30 16:08:56 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.09.30 16:08:56 - OpenVPN >   MAC = f8:a9:63:47:09:c1
. 2016.09.30 16:08:56 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   DHCP SERV =
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE OBTAINED = Fri Sep 30 16:08:56 2016
. 2016.09.30 16:08:56 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Sep 30 16:08:56 2016
. 2016.09.30 16:08:56 - OpenVPN >   PRI WINS = 150.100.0.10/255.255.255.255
. 2016.09.30 16:08:56 - OpenVPN >   SEC WINS =
. 2016.09.30 16:08:56 - OpenVPN >   DNS SERV =
. 2016.09.30 16:08:56 - Starting Management Interface
. 2016.09.30 16:08:56 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
I 2016.09.30 16:08:56 - DNS leak protection with packet filtering enabled.
I 2016.09.30 16:08:56 - Flushing DNS
. 2016.09.30 16:08:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.09.30 16:08:57 - Disconnecting
. 2016.09.30 16:08:57 - Management - Send 'signal SIGTERM'
. 2016.09.30 16:08:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.09.30 16:08:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.09.30 16:08:57 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.09.30 16:09:02 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.161.34 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 16:09:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:09:02 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:09:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:09:02 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:09:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.09.30 16:09:02 - OpenVPN > Closing TUN/TAP interface
. 2016.09.30 16:09:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.09.30 16:09:02 - Connection terminated.
I 2016.09.30 16:09:02 - DNS leak protection with packet filtering disabled.
I 2016.09.30 16:09:05 - Checking authorization ...
! 2016.09.30 16:09:05 - Connecting to Subra (Netherlands, Alblasserdam)
. 2016.09.30 16:09:05 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.09.30 16:09:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.09.30 16:09:05 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.09.30 16:09:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.09.30 16:09:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.09.30 16:09:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.09.30 16:09:05 - OpenVPN > UDPv4 link local: [undef]
. 2016.09.30 16:09:05 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443
. 2016.09.30 16:09:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=ee54dff3 4f01796e
. 2016.09.30 16:09:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 16:09:05 - OpenVPN > Validating certificate key usage
. 2016.09.30 16:09:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 16:09:05 - OpenVPN > VERIFY KU OK
. 2016.09.30 16:09:05 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 16:09:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 16:09:05 - OpenVPN > VERIFY EKU OK
. 2016.09.30 16:09:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 16:09:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:09:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:09:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 16:09:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443
. 2016.09.30 16:09:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.09.30 16:09:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.62.132 255.255.0.0'
. 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.09.30 16:09:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af
. 2016.09.30 16:09:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.09.30 16:09:07 - OpenVPN > open_tun, tt->ipv6=0
. 2016.09.30 16:09:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap
. 2016.09.30 16:09:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.09.30 16:09:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.62.132/255.255.0.0 [sUCCEEDED]
. 2016.09.30 16:09:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.62.132/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.09.30 16:09:07 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A}
. 2016.09.30 16:09:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:12 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:17 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:18 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:18 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:18 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:19 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:19 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:19 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:20 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:20 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:20 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:21 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:21 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:22 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:22 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:22 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:23 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:23 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:24 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:24 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:25 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:25 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:26 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:27 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:27 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:28 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:28 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:28 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:29 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.09.30 16:09:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.09.30 16:09:29 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2016.09.30 16:09:30 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2016.09.30 16:09:30 - OpenVPN > Closing TUN/TAP interface
. 2016.09.30 16:09:30 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2016.09.30 16:09:30 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.09.30 16:09:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.09.30 16:09:30 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.09.30 16:09:30 - OpenVPN > Restart pause, 10 second(s)
! 2016.09.30 16:09:30 - Disconnecting
. 2016.09.30 16:09:30 - Connection terminated.
I 2016.09.30 16:09:33 - Checking authorization ...
! 2016.09.30 16:09:33 - Connecting to Skat (Netherlands, Alblasserdam)
. 2016.09.30 16:09:33 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun  1 2016
. 2016.09.30 16:09:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.09.30 16:09:33 - OpenVPN > library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
. 2016.09.30 16:09:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.09.30 16:09:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.09.30 16:09:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.09.30 16:09:34 - OpenVPN > UDPv4 link local: [undef]
. 2016.09.30 16:09:34 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.73:443
. 2016.09.30 16:09:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.73:443, sid=187a627a 2341ecac
. 2016.09.30 16:09:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.09.30 16:09:34 - OpenVPN > Validating certificate key usage
. 2016.09.30 16:09:34 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.09.30 16:09:34 - OpenVPN > VERIFY KU OK
. 2016.09.30 16:09:34 - OpenVPN > Validating certificate extended key usage
. 2016.09.30 16:09:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.09.30 16:09:34 - OpenVPN > VERIFY EKU OK
. 2016.09.30 16:09:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.09.30 16:09:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:09:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.09.30 16:09:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.09.30 16:09:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.09.30 16:09:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.73:443
. 2016.09.30 16:09:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.09.30 16:09:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.242 255.255.0.0'
. 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.09.30 16:09:36 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af
. 2016.09.30 16:09:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.09.30 16:09:36 - OpenVPN > open_tun, tt->ipv6=0
. 2016.09.30 16:09:36 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap
. 2016.09.30 16:09:36 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.09.30 16:09:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.242/255.255.0.0 [sUCCEEDED]
. 2016.09.30 16:09:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.242/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.09.30 16:09:36 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A}
. 2016.09.30 16:09:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.09.30 16:09:41 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.161.73 MASK 255.255.255.255 192.168.0.1
. 2016.09.30 16:09:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:09:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:09:41 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:09:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:09:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:09:41 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.09.30 16:09:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.09.30 16:09:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.09.30 16:09:41 - Starting Management Interface
. 2016.09.30 16:09:41 - OpenVPN > Initialization Sequence Completed
I 2016.09.30 16:09:41 - DNS leak protection with packet filtering enabled.
I 2016.09.30 16:09:41 - Flushing DNS
I 2016.09.30 16:09:41 - Checking route
I 2016.09.30 16:09:42 - Checking DNS
! 2016.09.30 16:09:42 - Connected.
. 2016.09.30 16:09:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.09.30 16:09:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

 

Is there anything I should be doing otherwise Staff? Thank you.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

New version 2.11.5beta is now available. Changelog from 2.11.3beta:

 

[bugfix] Improved Windows position/size management (now work with 'run' shortcuts properties)

[bugfix] CIDR notation in route IP

[change] Improved ordering of directives in generated ovpn config file

[new] Automatic "max-routes" directive, or ordering it if manually specified.

[change] Option "Force all interfaces for DNS" now enabled by default.

[bugfix] Countries bandwidth

[change] Linux - man page improvements, and switched to group 8.

[bugfix] Privileges request not required on CLI help/man

[new] Linux - Added man-page in RPM

[change] Linux / OS X - Check DNS fixed on some OS (for example Fedora 24)

[change] Linux - DNS renaming method improved with symlink

[new] Linux - DNS renaming, recovering if /etc/resolv.conf is missing

[bugfix] Linux - Detect and workaround Pinger bug that occur only if hostname is misconfigured

[bugfix] OS X - Tor Browser 6.x compatibility

[bugfix] Windows XP - Unable to load DLL 'LibPocketFirewall.dll'

[bugfix] Whitelist/blacklist from command-line.

[new] Added total session bytes read/write statistics

[bugfix] Windows - VPN bytes read/write statistics reset at VPN connection

[new] Additional providers draft support

Share this post


Link to post
Guest

New version 2.11.5beta is now available. Changelog from 2.11.3beta:

 

[bugfix] Improved Windows position/size management (now work with 'run' shortcuts properties)

[bugfix] CIDR notation in route IP

[change] Improved ordering of directives in generated ovpn config file

[new] Automatic "max-routes" directive, or ordering it if manually specified.

[change] Option "Force all interfaces for DNS" now enabled by default.

[bugfix] Countries bandwidth

[change] Linux - man page improvements, and switched to group 8.

[bugfix] Privileges request not required on CLI help/man

[new] Linux - Added man-page in RPM

[change] Linux / OS X - Check DNS fixed on some OS (for example Fedora 24)

[change] Linux - DNS renaming method improved with symlink

[new] Linux - DNS renaming, recovering if /etc/resolv.conf is missing

[bugfix] Linux - Detect and workaround Pinger bug that occur only if hostname is misconfigured

[bugfix] OS X - Tor Browser 6.x compatibility

[bugfix] Windows XP - Unable to load DLL 'LibPocketFirewall.dll'

[bugfix] Whitelist/blacklist from command-line.

[new] Added total session bytes read/write statistics

[bugfix] Windows - VPN bytes read/write statistics reset at VPN connection

[new] Additional providers draft support

No clue if it's fixed in this but i sometimes missing the airvpn icon from taskbar and if i restart explorer it shows again. Any way to give you any logs to see if you can identify the problem?

I am using Windows 10 64 bit latest. 

Share this post


Link to post

I'm sure this has been asked/discussed already, but are we going to be able to minimize to tray anytime soon? (on linux)

Share this post


Link to post

I've downloaded the portable version that comes bundled with mono. Unfortunately the archive does not contain the executable airvpn file so it is useless. The version that requires mono on the other hand works as it contains the file AirVPN.exe.

Share this post


Link to post

I've downloaded the portable version that comes bundled with mono. Unfortunately the archive does not contain the executable airvpn file so it is useless. The version that requires mono on the other hand works as it contains the file AirVPN.exe.

 

Thank you for the head-up, we fixed the problem.

 

Kind regards

Share this post


Link to post

I tried out 2.11.5, at first I was still having problems with DNS checking, but eventually got it to work after messing around with resolv.conf and resolv.conf.bak. However after leaving it running overnight, I ran into the same problem I had with the previous version, where eddie is still running in the backround, but the GUI for it completely freezes and is non-responsive. There is no info recorded about this in the logs, but I have attached the relevant part from my log anyways.

 

EDIT: This was on Manjaro.

 

Log:

. 2016.10.08 04:16:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.10.08 04:24:50 - Updating systems & servers data ...
. 2016.10.08 04:24:53 - Systems & servers data update completed
. 2016.10.08 04:34:53 - Updating systems & servers data ...
. 2016.10.08 04:34:54 - Systems & servers data update completed
. 2016.10.08 04:44:55 - Updating systems & servers data ...
. 2016.10.08 04:44:56 - Systems & servers data update completed
. 2016.10.08 04:54:57 - Updating systems & servers data ...
. 2016.10.08 04:55:00 - Systems & servers data update completed
. 2016.10.08 05:05:00 - Updating systems & servers data ...
. 2016.10.08 05:05:02 - Systems & servers data update completed
. 2016.10.08 05:15:02 - Updating systems & servers data ...
. 2016.10.08 05:15:04 - Systems & servers data update completed
. 2016.10.08 05:16:20 - OpenVPN > TLS: soft reset sec=0 bytes=2335760982/0 pkts=2630288/0
. 2016.10.08 05:16:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 05:16:20 - OpenVPN > Validating certificate key usage
. 2016.10.08 05:16:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 05:16:20 - OpenVPN > VERIFY KU OK
. 2016.10.08 05:16:20 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 05:16:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 05:16:20 - OpenVPN > VERIFY EKU OK
. 2016.10.08 05:16:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 05:16:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 05:16:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 05:16:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 05:16:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 05:16:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 05:25:04 - Updating systems & servers data ...
. 2016.10.08 05:25:07 - Systems & servers data update completed
. 2016.10.08 05:35:08 - Updating systems & servers data ...
. 2016.10.08 05:35:10 - Systems & servers data update completed
. 2016.10.08 05:45:10 - Updating systems & servers data ...
. 2016.10.08 05:45:13 - Systems & servers data update completed
. 2016.10.08 05:55:13 - Updating systems & servers data ...
. 2016.10.08 05:55:15 - Systems & servers data update completed
. 2016.10.08 06:05:15 - Updating systems & servers data ...
. 2016.10.08 06:05:17 - Systems & servers data update completed
. 2016.10.08 06:15:18 - Updating systems & servers data ...
. 2016.10.08 06:15:24 - Systems & servers data update completed
. 2016.10.08 06:16:20 - OpenVPN > TLS: soft reset sec=0 bytes=1832691762/0 pkts=2036398/0
. 2016.10.08 06:16:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 06:16:20 - OpenVPN > Validating certificate key usage
. 2016.10.08 06:16:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 06:16:20 - OpenVPN > VERIFY KU OK
. 2016.10.08 06:16:20 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 06:16:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 06:16:20 - OpenVPN > VERIFY EKU OK
. 2016.10.08 06:16:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 06:16:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 06:16:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 06:16:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 06:16:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 06:16:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 06:25:25 - Updating systems & servers data ...
. 2016.10.08 06:25:27 - Systems & servers data update completed
. 2016.10.08 06:35:27 - Updating systems & servers data ...
. 2016.10.08 06:35:29 - Systems & servers data update completed
. 2016.10.08 06:45:30 - Updating systems & servers data ...
. 2016.10.08 06:45:33 - Systems & servers data update completed
. 2016.10.08 06:55:33 - Updating systems & servers data ...
. 2016.10.08 06:55:40 - Systems & servers data update completed
. 2016.10.08 07:05:40 - Updating systems & servers data ...
. 2016.10.08 07:05:44 - Systems & servers data update completed
. 2016.10.08 07:15:44 - Updating systems & servers data ...
. 2016.10.08 07:15:48 - Systems & servers data update completed
. 2016.10.08 07:16:20 - OpenVPN > TLS: soft reset sec=0 bytes=1697142285/0 pkts=1958039/0
. 2016.10.08 07:16:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 07:16:20 - OpenVPN > Validating certificate key usage
. 2016.10.08 07:16:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 07:16:20 - OpenVPN > VERIFY KU OK
. 2016.10.08 07:16:20 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 07:16:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 07:16:20 - OpenVPN > VERIFY EKU OK
. 2016.10.08 07:16:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 07:16:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 07:16:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 07:16:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 07:16:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 07:16:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 07:25:48 - Updating systems & servers data ...
. 2016.10.08 07:25:50 - Systems & servers data update completed
. 2016.10.08 07:35:50 - Updating systems & servers data ...
. 2016.10.08 07:35:53 - Systems & servers data update completed
. 2016.10.08 07:45:53 - Updating systems & servers data ...
. 2016.10.08 07:45:55 - Systems & servers data update completed
. 2016.10.08 07:55:55 - Updating systems & servers data ...
. 2016.10.08 07:55:57 - Systems & servers data update completed
. 2016.10.08 08:05:58 - Updating systems & servers data ...
. 2016.10.08 08:06:03 - Systems & servers data update completed
. 2016.10.08 08:16:03 - Updating systems & servers data ...
. 2016.10.08 08:16:05 - Systems & servers data update completed
. 2016.10.08 08:16:20 - OpenVPN > TLS: soft reset sec=0 bytes=1497393450/0 pkts=1763402/0
. 2016.10.08 08:16:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 08:16:20 - OpenVPN > Validating certificate key usage
. 2016.10.08 08:16:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 08:16:20 - OpenVPN > VERIFY KU OK
. 2016.10.08 08:16:20 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 08:16:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 08:16:20 - OpenVPN > VERIFY EKU OK
. 2016.10.08 08:16:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 08:16:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 08:16:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 08:16:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 08:16:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 08:16:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 08:26:05 - Updating systems & servers data ...
. 2016.10.08 08:26:06 - Systems & servers data update completed
. 2016.10.08 08:36:07 - Updating systems & servers data ...
. 2016.10.08 08:36:10 - Systems & servers data update completed
. 2016.10.08 08:46:10 - Updating systems & servers data ...
. 2016.10.08 08:46:13 - Systems & servers data update completed
. 2016.10.08 08:56:13 - Updating systems & servers data ...
. 2016.10.08 08:56:16 - Systems & servers data update completed
. 2016.10.08 09:06:16 - Updating systems & servers data ...
. 2016.10.08 09:06:23 - Systems & servers data update completed
. 2016.10.08 09:16:20 - OpenVPN > TLS: soft reset sec=0 bytes=901035055/0 pkts=1169157/0
. 2016.10.08 09:16:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 09:16:20 - OpenVPN > Validating certificate key usage
. 2016.10.08 09:16:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 09:16:20 - OpenVPN > VERIFY KU OK
. 2016.10.08 09:16:20 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 09:16:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 09:16:20 - OpenVPN > VERIFY EKU OK
. 2016.10.08 09:16:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 09:16:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 09:16:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 09:16:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 09:16:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 09:16:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 09:16:23 - Updating systems & servers data ...
. 2016.10.08 09:16:25 - Systems & servers data update completed
. 2016.10.08 09:26:25 - Updating systems & servers data ...
. 2016.10.08 09:26:27 - Systems & servers data update completed
. 2016.10.08 09:36:27 - Updating systems & servers data ...
. 2016.10.08 09:36:29 - Systems & servers data update completed
. 2016.10.08 09:46:29 - Updating systems & servers data ...
. 2016.10.08 09:46:32 - Systems & servers data update completed
. 2016.10.08 09:56:32 - Updating systems & servers data ...
. 2016.10.08 09:56:35 - Systems & servers data update completed
. 2016.10.08 10:06:35 - Updating systems & servers data ...
. 2016.10.08 10:06:37 - Systems & servers data update completed
. 2016.10.08 10:16:20 - OpenVPN > TLS: soft reset sec=0 bytes=1085102337/0 pkts=1480411/0
. 2016.10.08 10:16:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 10:16:20 - OpenVPN > Validating certificate key usage
. 2016.10.08 10:16:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 10:16:20 - OpenVPN > VERIFY KU OK
. 2016.10.08 10:16:20 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 10:16:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 10:16:20 - OpenVPN > VERIFY EKU OK
. 2016.10.08 10:16:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 10:16:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 10:16:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 10:16:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 10:16:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 10:16:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 10:16:37 - Updating systems & servers data ...
. 2016.10.08 10:16:39 - Systems & servers data update completed
. 2016.10.08 10:26:39 - Updating systems & servers data ...
. 2016.10.08 10:26:42 - Systems & servers data update completed
. 2016.10.08 10:36:42 - Updating systems & servers data ...
. 2016.10.08 10:36:45 - Systems & servers data update completed
. 2016.10.08 10:46:45 - Updating systems & servers data ...
. 2016.10.08 10:46:48 - Systems & servers data update completed
. 2016.10.08 10:56:49 - Updating systems & servers data ...
. 2016.10.08 10:56:51 - Systems & servers data update completed
. 2016.10.08 11:06:52 - Updating systems & servers data ...
. 2016.10.08 11:06:57 - Systems & servers data update completed
I 2016.10.08 11:16:20 - Renewing TLS key
. 2016.10.08 11:16:20 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.10.08 11:16:24 - OpenVPN > TLS: soft reset sec=0 bytes=876253714/0 pkts=1245374/0
. 2016.10.08 11:16:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 11:16:24 - OpenVPN > Validating certificate key usage
. 2016.10.08 11:16:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 11:16:24 - OpenVPN > VERIFY KU OK
. 2016.10.08 11:16:24 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 11:16:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 11:16:24 - OpenVPN > VERIFY EKU OK
. 2016.10.08 11:16:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 11:16:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 11:16:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 11:16:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 11:16:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 11:16:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 11:16:57 - Updating systems & servers data ...
. 2016.10.08 11:16:59 - Systems & servers data update completed
. 2016.10.08 11:27:00 - Updating systems & servers data ...
. 2016.10.08 11:27:03 - Systems & servers data update completed
. 2016.10.08 11:37:03 - Updating systems & servers data ...
. 2016.10.08 11:37:05 - Systems & servers data update completed
. 2016.10.08 11:47:05 - Updating systems & servers data ...
. 2016.10.08 11:47:13 - Systems & servers data update completed
. 2016.10.08 11:57:13 - Updating systems & servers data ...
. 2016.10.08 11:57:15 - Systems & servers data update completed
. 2016.10.08 12:07:16 - Updating systems & servers data ...
. 2016.10.08 12:07:17 - Systems & servers data update completed
. 2016.10.08 12:16:24 - OpenVPN > TLS: soft reset sec=0 bytes=871382814/0 pkts=1335100/0
. 2016.10.08 12:16:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 12:16:24 - OpenVPN > Validating certificate key usage
. 2016.10.08 12:16:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 12:16:24 - OpenVPN > VERIFY KU OK
. 2016.10.08 12:16:24 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 12:16:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 12:16:24 - OpenVPN > VERIFY EKU OK
. 2016.10.08 12:16:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 12:16:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 12:16:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 12:16:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 12:16:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 12:16:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 12:17:17 - Updating systems & servers data ...
. 2016.10.08 12:17:19 - Systems & servers data update completed
. 2016.10.08 12:27:20 - Updating systems & servers data ...
. 2016.10.08 12:27:22 - Systems & servers data update completed
. 2016.10.08 12:37:22 - Updating systems & servers data ...
. 2016.10.08 12:37:24 - Systems & servers data update completed
. 2016.10.08 12:47:24 - Updating systems & servers data ...
. 2016.10.08 12:47:32 - Systems & servers data update completed
. 2016.10.08 12:57:32 - Updating systems & servers data ...
. 2016.10.08 12:57:35 - Systems & servers data update completed
. 2016.10.08 13:07:35 - Updating systems & servers data ...
. 2016.10.08 13:07:37 - Systems & servers data update completed
I 2016.10.08 13:16:24 - Renewing TLS key
. 2016.10.08 13:16:24 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.10.08 13:16:28 - OpenVPN > TLS: soft reset sec=0 bytes=1162553564/0 pkts=1807580/0
. 2016.10.08 13:16:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 13:16:30 - OpenVPN > Validating certificate key usage
. 2016.10.08 13:16:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 13:16:30 - OpenVPN > VERIFY KU OK
. 2016.10.08 13:16:30 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 13:16:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 13:16:30 - OpenVPN > VERIFY EKU OK
. 2016.10.08 13:16:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 13:16:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 13:16:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 13:16:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 13:16:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 13:16:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 13:17:38 - Updating systems & servers data ...
. 2016.10.08 13:17:40 - Systems & servers data update completed
. 2016.10.08 13:27:40 - Updating systems & servers data ...
. 2016.10.08 13:27:42 - Systems & servers data update completed
. 2016.10.08 13:37:42 - Updating systems & servers data ...
. 2016.10.08 13:37:44 - Systems & servers data update completed
. 2016.10.08 13:47:44 - Updating systems & servers data ...
. 2016.10.08 13:47:47 - Systems & servers data update completed
. 2016.10.08 13:57:47 - Updating systems & servers data ...
. 2016.10.08 13:57:50 - Systems & servers data update completed
. 2016.10.08 14:07:50 - Updating systems & servers data ...
. 2016.10.08 14:07:53 - Systems & servers data update completed
I 2016.10.08 14:16:28 - Renewing TLS key
. 2016.10.08 14:16:28 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.10.08 14:16:30 - OpenVPN > TLS: soft reset sec=0 bytes=1327296278/0 pkts=2044810/0
. 2016.10.08 14:16:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 14:16:30 - OpenVPN > Validating certificate key usage
. 2016.10.08 14:16:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 14:16:30 - OpenVPN > VERIFY KU OK
. 2016.10.08 14:16:30 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 14:16:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 14:16:30 - OpenVPN > VERIFY EKU OK
. 2016.10.08 14:16:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 14:16:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 14:16:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 14:16:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 14:16:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 14:16:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 14:17:53 - Updating systems & servers data ...
. 2016.10.08 14:17:55 - Systems & servers data update completed
. 2016.10.08 14:27:55 - Updating systems & servers data ...
. 2016.10.08 14:27:57 - Systems & servers data update completed
. 2016.10.08 14:37:57 - Updating systems & servers data ...
. 2016.10.08 14:37:59 - Systems & servers data update completed
. 2016.10.08 14:48:00 - Updating systems & servers data ...
. 2016.10.08 14:48:02 - Systems & servers data update completed
. 2016.10.08 14:58:02 - Updating systems & servers data ...
. 2016.10.08 14:58:04 - Systems & servers data update completed
. 2016.10.08 15:08:04 - Updating systems & servers data ...
. 2016.10.08 15:08:06 - Systems & servers data update completed
. 2016.10.08 15:16:30 - OpenVPN > TLS: soft reset sec=0 bytes=1891516258/0 pkts=2938027/0
. 2016.10.08 15:16:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 15:16:30 - OpenVPN > Validating certificate key usage
. 2016.10.08 15:16:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 15:16:30 - OpenVPN > VERIFY KU OK
. 2016.10.08 15:16:30 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 15:16:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 15:16:30 - OpenVPN > VERIFY EKU OK
. 2016.10.08 15:16:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 15:16:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 15:16:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 15:16:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 15:16:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 15:16:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 15:18:06 - Updating systems & servers data ...
. 2016.10.08 15:18:09 - Systems & servers data update completed
. 2016.10.08 15:28:09 - Updating systems & servers data ...
. 2016.10.08 15:28:11 - Systems & servers data update completed
. 2016.10.08 15:38:11 - Updating systems & servers data ...
. 2016.10.08 15:38:14 - Systems & servers data update completed
. 2016.10.08 15:48:15 - Updating systems & servers data ...
. 2016.10.08 15:48:16 - Systems & servers data update completed
. 2016.10.08 15:58:17 - Updating systems & servers data ...
. 2016.10.08 15:58:19 - Systems & servers data update completed
. 2016.10.08 16:08:19 - Updating systems & servers data ...
. 2016.10.08 16:08:21 - Systems & servers data update completed
. 2016.10.08 16:16:30 - OpenVPN > TLS: soft reset sec=0 bytes=1601023003/0 pkts=2276296/0
. 2016.10.08 16:16:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.08 16:16:30 - OpenVPN > Validating certificate key usage
. 2016.10.08 16:16:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.10.08 16:16:30 - OpenVPN > VERIFY KU OK
. 2016.10.08 16:16:30 - OpenVPN > Validating certificate extended key usage
. 2016.10.08 16:16:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.08 16:16:30 - OpenVPN > VERIFY EKU OK
. 2016.10.08 16:16:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.08 16:16:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 16:16:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 16:16:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.08 16:16:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.08 16:16:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.08 16:18:21 - Updating systems & servers data ...
. 2016.10.08 16:18:23 - Systems & servers data update completed
. 2016.10.08 16:28:24 - Updating systems & servers data ...
. 2016.10.08 16:28:25 - Systems & servers data update completed
. 2016.10.08 16:38:25 - Updating systems & servers data ...
. 2016.10.08 16:38:27 - Systems & servers data update completed
. 2016.10.08 16:48:28 - Updating systems & servers data ...
. 2016.10.08 16:48:29 - Systems & servers data update completed
. 2016.10.08 16:58:30 - Updating systems & servers data ...
. 2016.10.08 16:58:31 - Systems & servers data update completed

Share this post


Link to post

I had the (Mono) GUI freeze on a couple of occasions recently under Eddie beta 2.11.3 + 14.04 LTS.

 

 

Regarding the new beta 2.11.5 (same 14.04 LTS + unofficial kernel 4.8.1), a while ago I had a server losing connection and not able to reconnect on its own. When I cancelled reconnection attempts and tried connecting to a different nearby server I was shown error "Limit of 3 connections reached".

 

Sorry no logs as I went through the motions to kill openvpn process and restarted Eddie which cleared the issue.

 

Another minor issue I noticed is that the Eddie GUI showed no tooltips.

Share this post


Link to post

problem here with the portable eddie 2.11.5 on manjaro kde

 

UI crash after launch, version 2.11.3 works well

 

2.11.5 portable works fine on win7

Share this post


Link to post

I tried out 2.11.5, at first I was still having problems with DNS checking, but eventually got it to work after messing around with resolv.conf and resolv.conf.bak. However after leaving it running overnight, I ran into the same problem I had with the previous version, where eddie is still running in the backround, but the GUI for it completely freezes and is non-responsive. There is no info recorded about this in the logs, but I have attached the relevant part from my log anyways.

 

I reported the same issue with the previous Eddie beta for macOS Sierra, i.e., client hangs but the openvpn process remains running in the background. Will try with the latest beta but it sounds like this problem hasn't been resolved, and may affect both Linux and macOS.

Share this post


Link to post

New beta working well except I noticed that on the overview of the program and on the stats page, it shows DL of 0 B/s even though I was successfully downloading several GBs (as confirmed by NetWorx).

 

Can send logfile, if need be.

Share this post


Link to post

 

[new] Additional providers draft support

 

What is this?

 

I believe this is the beginning of the ability to use Eddie with other openvpn configs.

Share this post


Link to post

 

 

[new] Additional providers draft support

 

What is this?

 

 

I believe this is the beginning of the ability to use Eddie with other openvpn configs.

 

I imagined but if they added the support, it should be usable right? I wonder how, I attempted the way they provided in the Future Eddie Directions thread and it didn't seem to work.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...