Dijas 0 Posted ... So, I'm on a college campus. I had AirVPN running on my other computer when I did the 3 day trial. A few weeks later I just purchased a 6 month licence. Now, when attempting to connect, I get stuck in a connecting-disconnecting loop. Here are my logs: I 2016.09.13 16:03:49 - Session starting.I 2016.09.13 16:03:49 - IPv6 disabled.I 2016.09.13 16:03:49 - Checking authorization ...! 2016.09.13 16:03:49 - Connecting to Miram (Netherlands, Alblasserdam). 2016.09.13 16:05:56 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.09.13 16:05:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.09.13 16:05:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.09.13 16:05:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.09.13 16:05:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:05:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:05:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.09.13 16:05:56 - OpenVPN > UDPv4 link local: [undef]. 2016.09.13 16:05:56 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2016.09.13 16:05:56 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=965d4705 15737e63. 2016.09.13 16:05:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.09.13 16:05:56 - OpenVPN > Validating certificate key usage. 2016.09.13 16:05:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.09.13 16:05:56 - OpenVPN > VERIFY KU OK. 2016.09.13 16:05:56 - OpenVPN > Validating certificate extended key usage. 2016.09.13 16:05:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.09.13 16:05:56 - OpenVPN > VERIFY EKU OK. 2016.09.13 16:05:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.09.13 16:05:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.13 16:05:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:05:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.13 16:05:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:05:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.09.13 16:05:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2016.09.13 16:05:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.09.13 16:05:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.77.235 255.255.0.0'. 2016.09.13 16:05:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.09.13 16:05:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.09.13 16:05:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.09.13 16:05:56 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.09.13 16:05:56 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.09.13 16:05:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.09.13 16:05:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.09.13 16:05:56 - OpenVPN > open_tun, tt->ipv6=0. 2016.09.13 16:05:56 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5B2946B8-0C5E-4808-BA53-78D94261FC2B}.tap. 2016.09.13 16:05:56 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.09.13 16:05:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.77.235/255.255.0.0 [sUCCEEDED]. 2016.09.13 16:05:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.77.235/255.255.0.0 on interface {5B2946B8-0C5E-4808-BA53-78D94261FC2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.09.13 16:05:56 - OpenVPN > Successful ARP Flush on interface [7] {5B2946B8-0C5E-4808-BA53-78D94261FC2B}. 2016.09.13 16:05:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.09.13 16:05:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 10.4.0.1. 2016.09.13 16:05:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.09.13 16:05:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.13 16:05:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 10.4.0.1. 2016.09.13 16:05:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.09.13 16:05:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.13 16:05:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.09.13 16:05:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.09.13 16:05:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.13 16:05:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.09.13 16:05:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.09.13 16:05:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.13 16:05:56 - Starting Management Interface. 2016.09.13 16:05:56 - OpenVPN > Initialization Sequence Completed. 2016.09.13 16:05:56 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2016.09.13 16:05:56 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2016.09.13 16:05:56 - OpenVPN > Restart pause, 2 second(s)I 2016.09.13 16:05:56 - DNS of a network adapter forced (Realtek RTL8723BE 802.11 b/g/n Wi-Fi Adapter)! 2016.09.13 16:05:56 - Disconnecting. 2016.09.13 16:05:56 - Management - Send 'signal SIGTERM'. 2016.09.13 16:05:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more infoI 2016.09.13 16:05:56 - DNS of a network adapter forced (TAP-Windows Adapter V9). 2016.09.13 16:05:57 - Connection terminated.I 2016.09.13 16:05:57 - Flushing DNSI 2016.09.13 16:05:57 - DNS of a network adapter restored to original settings (Realtek RTL8723BE 802.11 b/g/n Wi-Fi Adapter)E 2016.09.13 16:05:57 - Collection was modified; enumeration operation may not execute.W 2016.09.13 16:05:57 - Waiting TUN interfaceI 2016.09.13 16:06:00 - Checking authorization ...! 2016.09.13 16:06:00 - Connecting to Miram (Netherlands, Alblasserdam). 2016.09.13 16:06:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.09.13 16:06:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.09.13 16:06:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.09.13 16:06:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.09.13 16:06:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.09.13 16:06:01 - OpenVPN > UDPv4 link local: [undef]. 2016.09.13 16:06:01 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2016.09.13 16:06:01 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=b0abe939 b259c850. 2016.09.13 16:06:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.09.13 16:06:01 - OpenVPN > Validating certificate key usage. 2016.09.13 16:06:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.09.13 16:06:01 - OpenVPN > VERIFY KU OK. 2016.09.13 16:06:01 - OpenVPN > Validating certificate extended key usage. 2016.09.13 16:06:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.09.13 16:06:01 - OpenVPN > VERIFY EKU OK. 2016.09.13 16:06:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgW 2016.09.13 16:06:01 - Waiting TUN interface. 2016.09.13 16:06:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.13 16:06:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.13 16:06:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.09.13 16:06:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443W 2016.09.13 16:06:07 - Tunnel not ready in 10 seconds, contact our support. Last interface status: Down. 2016.09.13 16:06:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.09.13 16:06:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.09.13 16:06:07 - OpenVPN > MANAGEMENT: Client disconnected. 2016.09.13 16:06:07 - OpenVPN > Assertion failed at misc.c:779. 2016.09.13 16:06:07 - OpenVPN > Exiting due to fatal error! 2016.09.13 16:06:07 - Disconnecting. 2016.09.13 16:06:07 - Connection terminated.I 2016.09.13 16:06:10 - Checking authorization ...! 2016.09.13 16:06:11 - Connecting to Miram (Netherlands, Alblasserdam). 2016.09.13 16:06:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.09.13 16:06:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.09.13 16:06:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.09.13 16:06:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.09.13 16:06:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:11 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.09.13 16:06:11 - OpenVPN > UDPv4 link local: [undef]. 2016.09.13 16:06:11 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2016.09.13 16:06:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=b208ee05 94a220d0. 2016.09.13 16:06:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.09.13 16:06:11 - OpenVPN > Validating certificate key usage. 2016.09.13 16:06:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.09.13 16:06:11 - OpenVPN > VERIFY KU OK. 2016.09.13 16:06:11 - OpenVPN > Validating certificate extended key usage. 2016.09.13 16:06:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.09.13 16:06:11 - OpenVPN > VERIFY EKU OK. 2016.09.13 16:06:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.09.13 16:06:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.13 16:06:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.13 16:06:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.13 16:06:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.09.13 16:06:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2016.09.13 16:06:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.09.13 16:06:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.77.235 255.255.0.0'. 2016.09.13 16:06:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.09.13 16:06:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.09.13 16:06:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.09.13 16:06:19 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.09.13 16:06:19 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.09.13 16:06:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.09.13 16:06:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.09.13 16:06:19 - OpenVPN > open_tun, tt->ipv6=0. 2016.09.13 16:06:19 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5B2946B8-0C5E-4808-BA53-78D94261FC2B}.tap. 2016.09.13 16:06:19 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.09.13 16:06:19 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.77.235/255.255.0.0 [sUCCEEDED]. 2016.09.13 16:06:19 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.77.235/255.255.0.0 on interface {5B2946B8-0C5E-4808-BA53-78D94261FC2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.09.13 16:06:19 - OpenVPN > Successful ARP Flush on interface [7] {5B2946B8-0C5E-4808-BA53-78D94261FC2B}. 2016.09.13 16:06:19 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065). 2016.09.13 16:06:24 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.09.13 16:06:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 10.4.0.1. 2016.09.13 16:06:24 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=7]. 2016.09.13 16:06:24 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.09.13 16:06:24 - OpenVPN > Route addition fallback to route.exe. 2016.09.13 16:06:24 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.09.13 16:06:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 10.4.0.1. 2016.09.13 16:06:24 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=7]. 2016.09.13 16:06:24 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.09.13 16:06:24 - OpenVPN > Route addition fallback to route.exe. 2016.09.13 16:06:24 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.09.13 16:06:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.09.13 16:06:24 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=7]. 2016.09.13 16:06:24 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.09.13 16:06:24 - OpenVPN > Route addition fallback to route.exe. 2016.09.13 16:06:24 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.09.13 16:06:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.09.13 16:06:24 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=7]. 2016.09.13 16:06:24 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.09.13 16:06:24 - OpenVPN > Route addition fallback to route.exe. 2016.09.13 16:06:24 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.09.13 16:06:24 - Starting Management Interface. 2016.09.13 16:06:24 - OpenVPN > Initialization Sequence CompletedI 2016.09.13 16:06:24 - DNS of a network adapter forced (Realtek RTL8723BE 802.11 b/g/n Wi-Fi Adapter)I 2016.09.13 16:06:24 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.09.13 16:06:24 - Flushing DNSI 2016.09.13 16:06:24 - Checking route I can't seem to figure out why it's not working, when it was fine just a couple weeks ago. Any help would be appreciated Quote Share this post Link to post
LZ1 672 Posted ... Hello ! Those don't look like the full logs - it seems some of the initial information is missing. If you're on a campus, perhaps you should try going to the Protocols tab and try other protocols; in particular the SSL ones. Provided you're using the Stable version of Eddie, you could try out the Experimental version too, if all else fails . Just head to the download page and click "Other Versions". Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
SumRndmDude 22 Posted ... 2016.09.13 16:05:56 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{5B2946B8-0C5E-4808-BA53-78D94261FC2B}.tap. 2016.09.13 16:05:56 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.09.13 16:05:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.77.235/255.255.0.0 [sUCCEEDED]. 2016.09.13 16:05:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.77.235/255.255.0.0 on interface {5B2946B8-0C5E-4808-BA53-78D94261FC2B} [DHCP-serv: 10.4.255.254, lease-time: 31536000] My first guess. Go to https://airvpn.org/topic/16573-tap-driver-9210-causing-a-myriad-of-issues/ and downgrade the driver. Quote Share this post Link to post