Jump to content
Not connected, Your IP: 3.133.147.169
Sign in to follow this  
FlurryOfStyx

Can't connect after "windows 10 anniversery update"

Recommended Posts

My PC automatically installed today windows 10's latest update (big update) and AirVPN can no longer connect. I tried re-installing but doesn't seem to be working.

 

I 2016.10.01 17:53:02 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.10.01 17:53:02 - Reading options from C:\Users\K\AppData\Local\AirVPN\AirVPN.xml
. 2016.10.01 17:53:02 - Data Path: C:\Users\K\AppData\Local\AirVPN
. 2016.10.01 17:53:02 - App Path: C:\Program Files\AirVPN
. 2016.10.01 17:53:02 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.10.01 17:53:02 - Command line arguments (1): path="home"
. 2016.10.01 17:53:02 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.10.01 17:53:02 - Updating systems & servers data ...
. 2016.10.01 17:53:03 - Systems & servers data update completed
I 2016.10.01 17:53:03 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.10.01 17:53:03 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.10.01 17:53:03 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.10.01 17:53:03 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.10.01 17:53:03 - Activation of Network Lock - Windows Firewall
I 2016.10.01 17:53:04 - Session starting.
I 2016.10.01 17:53:12 - Checking authorization ...
! 2016.10.01 17:53:13 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.10.01 17:53:13 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.10.01 17:53:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.10.01 17:53:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.10.01 17:53:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.10.01 17:53:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:53:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:53:13 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.10.01 17:53:13 - OpenVPN > UDPv4 link local: [undef]
. 2016.10.01 17:53:13 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.10.01 17:53:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=5dba04ba bf95e740
. 2016.10.01 17:53:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.01 17:53:13 - OpenVPN > Validating certificate key usage
. 2016.10.01 17:53:13 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.10.01 17:53:13 - OpenVPN > VERIFY KU OK
. 2016.10.01 17:53:13 - OpenVPN > Validating certificate extended key usage
. 2016.10.01 17:53:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.01 17:53:13 - OpenVPN > VERIFY EKU OK
. 2016.10.01 17:53:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.01 17:53:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:53:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:53:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:53:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:53:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.01 17:53:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.10.01 17:53:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.10.01 17:53:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.165 255.255.0.0'
. 2016.10.01 17:53:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.10.01 17:53:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.10.01 17:53:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.10.01 17:53:15 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.10.01 17:53:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.10.01 17:53:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.10.01 17:53:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.10.01 17:53:15 - OpenVPN > open_tun, tt->ipv6=0
. 2016.10.01 17:53:16 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}.tap
. 2016.10.01 17:53:16 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.10.01 17:53:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.30.165/255.255.0.0 [SUCCEEDED]
. 2016.10.01 17:53:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.30.165/255.255.0.0 on interface {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.10.01 17:53:16 - OpenVPN > Successful ARP Flush on interface [10] {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}
. 2016.10.01 17:53:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.10.01 17:53:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:53:21 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches)
. 2016.10.01 17:53:21 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.10.01 17:53:21 - OpenVPN > Route addition fallback to route.exe
. 2016.10.01 17:53:21 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.10.01 17:53:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 6
. 2016.10.01 17:53:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:53:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:53:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:53:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:53:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:53:21 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:53:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:53:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:53:21 - Starting Management Interface
. 2016.10.01 17:53:21 - OpenVPN > Initialization Sequence Completed
I 2016.10.01 17:53:21 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.10.01 17:53:21 - DNS of a network adapter forced (Broadcom 802.11n Network Adapter)
I 2016.10.01 17:53:21 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:53:21 - Flushing DNS
I 2016.10.01 17:53:21 - Checking route
W 2016.10.01 17:54:21 - The operation has timed out
! 2016.10.01 17:54:21 - Disconnecting
. 2016.10.01 17:54:21 - Management - Send 'signal SIGTERM'
. 2016.10.01 17:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.10.01 17:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.10.01 17:54:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.10.01 17:54:21 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.10.01 17:54:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:54:26 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches)
. 2016.10.01 17:54:26 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.10.01 17:54:26 - OpenVPN > Route deletion fallback to route.exe
. 2016.10.01 17:54:26 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.10.01 17:54:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:54:26 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches)
. 2016.10.01 17:54:26 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.10.01 17:54:26 - OpenVPN > Route deletion fallback to route.exe
. 2016.10.01 17:54:26 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.10.01 17:54:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:54:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:54:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:54:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:54:26 - OpenVPN > Closing TUN/TAP interface
. 2016.10.01 17:54:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.10.01 17:54:26 - Connection terminated.
I 2016.10.01 17:54:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.10.01 17:54:26 - DNS of a network adapter restored to original settings (Broadcom 802.11n Network Adapter)
I 2016.10.01 17:54:26 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:54:29 - Checking authorization ...
! 2016.10.01 17:54:29 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.10.01 17:54:29 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.10.01 17:54:29 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.10.01 17:54:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.10.01 17:54:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.10.01 17:54:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:54:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:54:29 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.10.01 17:54:29 - OpenVPN > UDPv4 link local: [undef]
. 2016.10.01 17:54:29 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.10.01 17:54:29 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=4cb68671 1556deaf
. 2016.10.01 17:54:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.01 17:54:30 - OpenVPN > Validating certificate key usage
. 2016.10.01 17:54:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.10.01 17:54:30 - OpenVPN > VERIFY KU OK
. 2016.10.01 17:54:30 - OpenVPN > Validating certificate extended key usage
. 2016.10.01 17:54:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.01 17:54:30 - OpenVPN > VERIFY EKU OK
. 2016.10.01 17:54:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.01 17:54:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:54:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:54:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:54:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:54:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.01 17:54:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.10.01 17:54:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.10.01 17:54:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.165 255.255.0.0'
. 2016.10.01 17:54:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.10.01 17:54:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.10.01 17:54:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.10.01 17:54:36 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.10.01 17:54:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.10.01 17:54:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.10.01 17:54:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.10.01 17:54:36 - OpenVPN > open_tun, tt->ipv6=0
. 2016.10.01 17:54:36 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}.tap
. 2016.10.01 17:54:36 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.10.01 17:54:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.30.165/255.255.0.0 [SUCCEEDED]
. 2016.10.01 17:54:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.30.165/255.255.0.0 on interface {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.10.01 17:54:36 - OpenVPN > Successful ARP Flush on interface [10] {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}
. 2016.10.01 17:54:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.10.01 17:54:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:54:41 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches)
. 2016.10.01 17:54:41 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.10.01 17:54:41 - OpenVPN > Route addition fallback to route.exe
. 2016.10.01 17:54:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.10.01 17:54:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 6
. 2016.10.01 17:54:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:54:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:54:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:54:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:54:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:54:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:54:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:54:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:54:41 - Starting Management Interface
. 2016.10.01 17:54:41 - OpenVPN > Initialization Sequence Completed
I 2016.10.01 17:54:41 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.10.01 17:54:41 - DNS of a network adapter forced (Broadcom 802.11n Network Adapter)
I 2016.10.01 17:54:42 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:54:42 - Flushing DNS
I 2016.10.01 17:54:42 - Checking route
W 2016.10.01 17:55:18 - The remote name could not be resolved: 'avior_exit.airservers.org'
! 2016.10.01 17:55:18 - Disconnecting
. 2016.10.01 17:55:18 - Management - Send 'signal SIGTERM'
. 2016.10.01 17:55:18 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.10.01 17:55:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.10.01 17:55:18 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.10.01 17:55:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:55:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:55:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:55:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:55:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:23 - OpenVPN > Closing TUN/TAP interface
. 2016.10.01 17:55:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.10.01 17:55:23 - Connection terminated.
I 2016.10.01 17:55:23 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.10.01 17:55:23 - DNS of a network adapter restored to original settings (Broadcom 802.11n Network Adapter)
I 2016.10.01 17:55:23 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:55:26 - Checking authorization ...
! 2016.10.01 17:55:26 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.10.01 17:55:26 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.10.01 17:55:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.10.01 17:55:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.10.01 17:55:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.10.01 17:55:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:55:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:55:26 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.10.01 17:55:26 - OpenVPN > UDPv4 link local: [undef]
. 2016.10.01 17:55:26 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.10.01 17:55:26 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=33610e69 707e6274
. 2016.10.01 17:55:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.01 17:55:26 - OpenVPN > Validating certificate key usage
. 2016.10.01 17:55:26 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.10.01 17:55:26 - OpenVPN > VERIFY KU OK
. 2016.10.01 17:55:26 - OpenVPN > Validating certificate extended key usage
. 2016.10.01 17:55:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.01 17:55:26 - OpenVPN > VERIFY EKU OK
. 2016.10.01 17:55:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.01 17:55:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:55:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:55:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:55:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:55:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.01 17:55:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.10.01 17:55:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.10.01 17:55:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.165 255.255.0.0'
. 2016.10.01 17:55:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.10.01 17:55:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.10.01 17:55:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.10.01 17:55:36 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.10.01 17:55:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.10.01 17:55:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.10.01 17:55:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.10.01 17:55:36 - OpenVPN > open_tun, tt->ipv6=0
. 2016.10.01 17:55:36 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}.tap
. 2016.10.01 17:55:36 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.10.01 17:55:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.30.165/255.255.0.0 [SUCCEEDED]
. 2016.10.01 17:55:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.30.165/255.255.0.0 on interface {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.10.01 17:55:36 - OpenVPN > Successful ARP Flush on interface [10] {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}
. 2016.10.01 17:55:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.10.01 17:55:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:55:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:55:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 6
. 2016.10.01 17:55:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:55:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:55:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:55:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:55:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:55:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:55:41 - Starting Management Interface
. 2016.10.01 17:55:41 - OpenVPN > Initialization Sequence Completed
I 2016.10.01 17:55:41 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.10.01 17:55:41 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:55:41 - Flushing DNS
I 2016.10.01 17:55:41 - Checking route
W 2016.10.01 17:56:05 - The remote name could not be resolved: 'avior_exit.airservers.org'
! 2016.10.01 17:56:06 - Disconnecting
. 2016.10.01 17:56:06 - Management - Send 'signal SIGTERM'
. 2016.10.01 17:56:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.10.01 17:56:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.10.01 17:56:06 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.10.01 17:56:11 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:56:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:11 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:56:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:11 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:56:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:11 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:56:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:11 - OpenVPN > Closing TUN/TAP interface
. 2016.10.01 17:56:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.10.01 17:56:11 - Connection terminated.
I 2016.10.01 17:56:11 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.10.01 17:56:11 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:56:14 - Checking authorization ...
! 2016.10.01 17:56:14 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.10.01 17:56:14 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.10.01 17:56:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.10.01 17:56:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.10.01 17:56:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.10.01 17:56:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:56:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:56:15 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.10.01 17:56:15 - OpenVPN > UDPv4 link local: [undef]
. 2016.10.01 17:56:15 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.10.01 17:56:15 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=e7dd19c7 b4680d9a
. 2016.10.01 17:56:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.01 17:56:15 - OpenVPN > Validating certificate key usage
. 2016.10.01 17:56:15 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.10.01 17:56:15 - OpenVPN > VERIFY KU OK
. 2016.10.01 17:56:15 - OpenVPN > Validating certificate extended key usage
. 2016.10.01 17:56:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.01 17:56:15 - OpenVPN > VERIFY EKU OK
. 2016.10.01 17:56:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.01 17:56:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:56:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:56:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:56:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:56:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.01 17:56:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.10.01 17:56:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.10.01 17:56:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.165 255.255.0.0'
. 2016.10.01 17:56:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.10.01 17:56:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.10.01 17:56:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.10.01 17:56:27 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.10.01 17:56:27 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.10.01 17:56:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.10.01 17:56:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.10.01 17:56:27 - OpenVPN > open_tun, tt->ipv6=0
. 2016.10.01 17:56:27 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}.tap
. 2016.10.01 17:56:27 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.10.01 17:56:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.30.165/255.255.0.0 [SUCCEEDED]
. 2016.10.01 17:56:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.30.165/255.255.0.0 on interface {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.10.01 17:56:27 - OpenVPN > Successful ARP Flush on interface [10] {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}
. 2016.10.01 17:56:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.10.01 17:56:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:56:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:56:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 6
. 2016.10.01 17:56:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:56:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:56:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:56:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:33 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:56:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:56:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:56:33 - Starting Management Interface
. 2016.10.01 17:56:33 - OpenVPN > Initialization Sequence Completed
I 2016.10.01 17:56:33 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.10.01 17:56:33 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:56:33 - Flushing DNS
I 2016.10.01 17:56:33 - Checking route
W 2016.10.01 17:56:57 - The remote name could not be resolved: 'avior_exit.airservers.org'
! 2016.10.01 17:56:57 - Disconnecting
. 2016.10.01 17:56:57 - Management - Send 'signal SIGTERM'
. 2016.10.01 17:56:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.10.01 17:56:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.10.01 17:56:57 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.10.01 17:57:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:57:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:57:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:02 - OpenVPN > Closing TUN/TAP interface
. 2016.10.01 17:57:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.10.01 17:57:02 - Connection terminated.
I 2016.10.01 17:57:02 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.10.01 17:57:02 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:57:05 - Checking authorization ...
! 2016.10.01 17:57:05 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.10.01 17:57:05 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.10.01 17:57:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.10.01 17:57:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.10.01 17:57:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.10.01 17:57:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:06 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.10.01 17:57:06 - OpenVPN > UDPv4 link local: [undef]
. 2016.10.01 17:57:06 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.10.01 17:57:06 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=f7bbeac8 3702d9db
. 2016.10.01 17:57:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.01 17:57:06 - OpenVPN > Validating certificate key usage
. 2016.10.01 17:57:06 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.10.01 17:57:06 - OpenVPN > VERIFY KU OK
. 2016.10.01 17:57:06 - OpenVPN > Validating certificate extended key usage
. 2016.10.01 17:57:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.01 17:57:06 - OpenVPN > VERIFY EKU OK
. 2016.10.01 17:57:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.01 17:57:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:57:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:57:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.01 17:57:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.10.01 17:57:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.10.01 17:57:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.165 255.255.0.0'
. 2016.10.01 17:57:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.10.01 17:57:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.10.01 17:57:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.10.01 17:57:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.10.01 17:57:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.10.01 17:57:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.10.01 17:57:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.10.01 17:57:12 - OpenVPN > open_tun, tt->ipv6=0
. 2016.10.01 17:57:12 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}.tap
. 2016.10.01 17:57:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.10.01 17:57:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.30.165/255.255.0.0 [SUCCEEDED]
. 2016.10.01 17:57:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.30.165/255.255.0.0 on interface {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.10.01 17:57:12 - OpenVPN > Successful ARP Flush on interface [10] {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}
. 2016.10.01 17:57:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.10.01 17:57:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:57:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 6
. 2016.10.01 17:57:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:17 - Starting Management Interface
. 2016.10.01 17:57:17 - OpenVPN > Initialization Sequence Completed
I 2016.10.01 17:57:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.10.01 17:57:17 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:57:17 - Flushing DNS
I 2016.10.01 17:57:17 - Checking route
W 2016.10.01 17:57:41 - The remote name could not be resolved: 'avior_exit.airservers.org'
! 2016.10.01 17:57:41 - Disconnecting
. 2016.10.01 17:57:41 - Management - Send 'signal SIGTERM'
. 2016.10.01 17:57:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.10.01 17:57:41 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.10.01 17:57:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.10.01 17:57:41 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.10.01 17:57:46 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:57:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:46 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:57:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:46 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:46 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:46 - OpenVPN > Closing TUN/TAP interface
. 2016.10.01 17:57:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.10.01 17:57:46 - Connection terminated.
I 2016.10.01 17:57:46 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.10.01 17:57:46 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:57:49 - Checking authorization ...
! 2016.10.01 17:57:49 - Connecting to Avior (Canada, Toronto, Ontario)
. 2016.10.01 17:57:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2016.10.01 17:57:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.10.01 17:57:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.10.01 17:57:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.10.01 17:57:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:49 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.10.01 17:57:49 - OpenVPN > UDPv4 link local: [undef]
. 2016.10.01 17:57:49 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443
. 2016.10.01 17:57:49 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=f9f31ae9 7c447551
. 2016.10.01 17:57:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.01 17:57:50 - OpenVPN > Validating certificate key usage
. 2016.10.01 17:57:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.10.01 17:57:50 - OpenVPN > VERIFY KU OK
. 2016.10.01 17:57:50 - OpenVPN > Validating certificate extended key usage
. 2016.10.01 17:57:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.01 17:57:50 - OpenVPN > VERIFY EKU OK
. 2016.10.01 17:57:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.01 17:57:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:57:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.01 17:57:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.01 17:57:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.01 17:57:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2016.10.01 17:57:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.10.01 17:57:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.165 255.255.0.0'
. 2016.10.01 17:57:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.10.01 17:57:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.10.01 17:57:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.10.01 17:57:52 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.10.01 17:57:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.10.01 17:57:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.10.01 17:57:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.10.01 17:57:52 - OpenVPN > open_tun, tt->ipv6=0
. 2016.10.01 17:57:52 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}.tap
. 2016.10.01 17:57:52 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.10.01 17:57:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.30.165/255.255.0.0 [SUCCEEDED]
. 2016.10.01 17:57:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.30.165/255.255.0.0 on interface {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.10.01 17:57:52 - OpenVPN > Successful ARP Flush on interface [10] {E924EAF6-8CE2-4FCD-8904-7B7C0D10D276}
. 2016.10.01 17:57:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.10.01 17:57:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.0.1
. 2016.10.01 17:57:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 6
. 2016.10.01 17:57:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.01 17:57:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.01 17:57:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.01 17:57:57 - Starting Management Interface
. 2016.10.01 17:57:57 - OpenVPN > Initialization Sequence Completed
I 2016.10.01 17:57:57 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.10.01 17:57:57 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.10.01 17:57:57 - Flushing DNS
I 2016.10.01 17:57:57 - Checking route

 

Share this post


Link to post

I have the same issue post the update it seems to stop working on my Windows 10 64bit set up. It appears to connect but when 'Checking Route' it times out and disconnects. Re-installed the software no luck and tried multiple servers but I get the same issue.

I am running version 2.10.3 of AirVPN client and

 

Here is my Log:

I 2016.10.02 09:08:38 - Session starting.
I 2016.10.02 09:08:38 - IPv6 disabled.
I 2016.10.02 09:08:38 - Checking authorization ...
! 2016.10.02 09:08:38 - Connecting to Dabih (United Kingdom, Manchester)
. 2016.10.02 09:08:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.10.02 09:08:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.10.02 09:08:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.10.02 09:08:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.10.02 09:08:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.02 09:08:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.02 09:08:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.10.02 09:08:38 - OpenVPN > UDPv4 link local: [undef]
. 2016.10.02 09:08:38 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2016.10.02 09:08:38 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=2971220e 1abf50f9
. 2016.10.02 09:08:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.10.02 09:08:38 - OpenVPN > Validating certificate key usage
. 2016.10.02 09:08:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.10.02 09:08:38 - OpenVPN > VERIFY KU OK
. 2016.10.02 09:08:38 - OpenVPN > Validating certificate extended key usage
. 2016.10.02 09:08:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.10.02 09:08:38 - OpenVPN > VERIFY EKU OK
. 2016.10.02 09:08:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.10.02 09:08:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.02 09:08:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.02 09:08:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.10.02 09:08:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.10.02 09:08:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.10.02 09:08:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2016.10.02 09:08:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.10.02 09:08:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.201 255.255.0.0'
. 2016.10.02 09:08:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.10.02 09:08:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.10.02 09:08:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.10.02 09:08:41 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.10.02 09:08:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.10.02 09:08:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.10.02 09:08:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.10.02 09:08:41 - OpenVPN > open_tun, tt->ipv6=0
. 2016.10.02 09:08:41 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{31684598-090C-4C25-A2B5-3E6E959E0071}.tap
. 2016.10.02 09:08:41 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.10.02 09:08:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.201/255.255.0.0 [sUCCEEDED]
. 2016.10.02 09:08:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.201/255.255.0.0 on interface {31684598-090C-4C25-A2B5-3E6E959E0071} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.10.02 09:08:41 - OpenVPN > Successful ARP Flush on interface [6] {31684598-090C-4C25-A2B5-3E6E959E0071}
. 2016.10.02 09:08:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.10.02 09:08:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.0.1
. 2016.10.02 09:08:46 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches)
. 2016.10.02 09:08:46 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.10.02 09:08:46 - OpenVPN > Route addition fallback to route.exe
. 2016.10.02 09:08:46 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.10.02 09:08:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 19
. 2016.10.02 09:08:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.10.02 09:08:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.02 09:08:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.02 09:08:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.02 09:08:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.02 09:08:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.02 09:08:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.10.02 09:08:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.10.02 09:08:46 - Starting Management Interface
. 2016.10.02 09:08:46 - OpenVPN > Initialization Sequence Completed
I 2016.10.02 09:08:46 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.10.02 09:08:46 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 3165)
I 2016.10.02 09:08:46 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.10.02 09:08:46 - Flushing DNS
I 2016.10.02 09:08:47 - Checking route
W 2016.10.02 09:09:47 - The operation has timed out
! 2016.10.02 09:09:47 - Disconnecting
. 2016.10.02 09:09:47 - Management - Send 'signal SIGTERM'
. 2016.10.02 09:09:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.10.02 09:09:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.10.02 09:09:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.10.02 09:09:47 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.10.02 09:09:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.0.1
. 2016.10.02 09:09:52 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches)
. 2016.10.02 09:09:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.10.02 09:09:52 - OpenVPN > Route deletion fallback to route.exe
. 2016.10.02 09:09:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.10.02 09:09:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.10.02 09:09:52 - OpenVPN > Warning: route gateway is ambiguous: 192.168.0.1 (2 matches)
. 2016.10.02 09:09:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.10.02 09:09:52 - OpenVPN > Route deletion fallback to route.exe
. 2016.10.02 09:09:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.10.02 09:09:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.02 09:09:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.02 09:09:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.10.02 09:09:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.10.02 09:09:52 - OpenVPN > Closing TUN/TAP interface
. 2016.10.02 09:09:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.10.02 09:09:52 - Connection terminated.
I 2016.10.02 09:09:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.10.02 09:09:52 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 3165)
I 2016.10.02 09:09:52 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)

Share this post


Link to post

Had the very same problem. it is caused, in my case at least, by an empty gateway ip.

 

 

 

I fixed it first by filling in the empty gateway with the dns ip (in this case they are the same), but that got annoying doing it every time is use vpn.

 

It seems the error is caused by Windows Firewall ( at least in my case ).

 

I used the following cmd command (as admin) do disable windows firewall

 

netsh advfirewall set allprofiles state off

 

 

have fun

 

akidburn

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...