h3h3y9 1 Posted ... Hi today I bought airvpn.After I logged in I connected to a recommended server. While its checking route the vpn disconnects because of a timeout I 2016.10.15 20:27:08 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64 . 2016.10.15 20:27:08 - Reading options from E:\AirVPN\AirVPN.xml . 2016.10.15 20:27:08 - Data Path: E:\AirVPN . 2016.10.15 20:27:08 - App Path: E:\AirVPN . 2016.10.15 20:27:08 - Executable Path: E:\AirVPN\AirVPN.exe . 2016.10.15 20:27:08 - Command line arguments (0): . 2016.10.15 20:27:08 - Operating System: Microsoft Windows NT 6.2.9200.0 . 2016.10.15 20:27:08 - Updating systems & servers data ... I 2016.10.15 20:27:08 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 I 2016.10.15 20:27:08 - OpenVPN - Version: OpenVPN 2.3.8 (E:\AirVPN\openvpn.exe) I 2016.10.15 20:27:08 - SSH - Version: plink 0.63 (E:\AirVPN\plink.exe) I 2016.10.15 20:27:08 - SSL - Version: stunnel 5.17 (E:\AirVPN\stunnel.exe) ! 2016.10.15 20:27:08 - Ready . 2016.10.15 20:27:08 - Systems & servers data update completed I 2016.10.15 20:27:10 - Session starting. I 2016.10.15 20:27:10 - IPv6 disabled. I 2016.10.15 20:27:16 - Checking authorization ... ! 2016.10.15 20:27:16 - Connecting to Atik (Netherlands, Alblasserdam) . 2016.10.15 20:27:16 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.10.15 20:27:16 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.10.15 20:27:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.15 20:27:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.15 20:27:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:27:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:27:16 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.10.15 20:27:16 - OpenVPN > UDPv4 link local: [undef] . 2016.10.15 20:27:16 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443 . 2016.10.15 20:27:16 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=65d6bd8c e4bf4e00 . 2016.10.15 20:27:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.15 20:27:16 - OpenVPN > Validating certificate key usage . 2016.10.15 20:27:16 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.15 20:27:16 - OpenVPN > VERIFY KU OK . 2016.10.15 20:27:16 - OpenVPN > Validating certificate extended key usage . 2016.10.15 20:27:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.15 20:27:16 - OpenVPN > VERIFY EKU OK . 2016.10.15 20:27:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.15 20:27:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:27:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:27:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:27:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:27:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.15 20:27:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443 . 2016.10.15 20:27:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.15 20:27:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.83.102 255.255.0.0' . 2016.10.15 20:27:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.15 20:27:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.15 20:27:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.15 20:27:19 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.15 20:27:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.15 20:27:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.15 20:27:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.15 20:27:19 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.15 20:27:19 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{52BD8FEC-7AFC-4261-8D1E-7D3661603D70}.tap . 2016.10.15 20:27:19 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.10.15 20:27:19 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.83.102/255.255.0.0 [SUCCEEDED] . 2016.10.15 20:27:19 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.83.102/255.255.0.0 on interface {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.15 20:27:19 - OpenVPN > Successful ARP Flush on interface [10] {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} . 2016.10.15 20:27:24 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.15 20:27:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:27:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:27:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:27:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 13 . 2016.10.15 20:27:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:27:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:27:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:27:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:27:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:27:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:27:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:27:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:27:24 - Starting Management Interface . 2016.10.15 20:27:24 - OpenVPN > Initialization Sequence Completed I 2016.10.15 20:27:24 - DNS of a network adapter forced (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:27:24 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.10.15 20:27:24 - Flushing DNS I 2016.10.15 20:27:24 - Checking route W 2016.10.15 20:28:14 - Timeout für Vorgang überschritten ! 2016.10.15 20:28:14 - Disconnecting . 2016.10.15 20:28:14 - Management - Send 'signal SIGTERM' . 2016.10.15 20:28:14 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.15 20:28:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.15 20:28:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.15 20:28:14 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.10.15 20:28:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:28:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:28:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:28:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:28:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:28:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:28:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:28:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:28:19 - OpenVPN > Closing TUN/TAP interface . 2016.10.15 20:28:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.15 20:28:19 - Connection terminated. I 2016.10.15 20:28:19 - DNS of a network adapter restored to original settings (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:28:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.10.15 20:28:22 - Checking authorization ... ! 2016.10.15 20:28:22 - Connecting to Atik (Netherlands, Alblasserdam) . 2016.10.15 20:28:22 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.10.15 20:28:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.10.15 20:28:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.15 20:28:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.15 20:28:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:28:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:28:22 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.10.15 20:28:22 - OpenVPN > UDPv4 link local: [undef] . 2016.10.15 20:28:22 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443 . 2016.10.15 20:28:22 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=a4997dfa fe9abdff . 2016.10.15 20:28:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.15 20:28:22 - OpenVPN > Validating certificate key usage . 2016.10.15 20:28:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.15 20:28:22 - OpenVPN > VERIFY KU OK . 2016.10.15 20:28:22 - OpenVPN > Validating certificate extended key usage . 2016.10.15 20:28:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.15 20:28:22 - OpenVPN > VERIFY EKU OK . 2016.10.15 20:28:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.15 20:28:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:28:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:28:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:28:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:28:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.15 20:28:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443 . 2016.10.15 20:28:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.15 20:28:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.83.102 255.255.0.0' . 2016.10.15 20:28:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.15 20:28:25 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.15 20:28:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.15 20:28:25 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.15 20:28:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.15 20:28:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.15 20:28:25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.15 20:28:25 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.15 20:28:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{52BD8FEC-7AFC-4261-8D1E-7D3661603D70}.tap . 2016.10.15 20:28:25 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.10.15 20:28:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.83.102/255.255.0.0 [SUCCEEDED] . 2016.10.15 20:28:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.83.102/255.255.0.0 on interface {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.15 20:28:25 - OpenVPN > Successful ARP Flush on interface [10] {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} . 2016.10.15 20:28:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.15 20:28:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:28:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:28:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:28:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 13 . 2016.10.15 20:28:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:28:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:28:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:28:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:28:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:28:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:28:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:28:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:28:30 - Starting Management Interface . 2016.10.15 20:28:30 - OpenVPN > Initialization Sequence Completed I 2016.10.15 20:28:30 - DNS of a network adapter forced (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:28:30 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.10.15 20:28:30 - Flushing DNS I 2016.10.15 20:28:30 - Checking route W 2016.10.15 20:29:20 - Timeout für Vorgang überschritten ! 2016.10.15 20:29:20 - Disconnecting . 2016.10.15 20:29:20 - Management - Send 'signal SIGTERM' . 2016.10.15 20:29:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.15 20:29:20 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.10.15 20:29:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.15 20:29:20 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.15 20:29:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:29:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:29:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:29:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:29:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:29:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:29:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:29:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:29:25 - OpenVPN > Closing TUN/TAP interface . 2016.10.15 20:29:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.15 20:29:25 - Connection terminated. I 2016.10.15 20:29:25 - DNS of a network adapter restored to original settings (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:29:25 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.10.15 20:29:28 - Checking authorization ... ! 2016.10.15 20:29:28 - Connecting to Atik (Netherlands, Alblasserdam) . 2016.10.15 20:29:28 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.10.15 20:29:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.10.15 20:29:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.15 20:29:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.15 20:29:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:29:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:29:28 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.10.15 20:29:28 - OpenVPN > UDPv4 link local: [undef] . 2016.10.15 20:29:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443 . 2016.10.15 20:29:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=477a872a 48bf38e9 . 2016.10.15 20:29:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.15 20:29:28 - OpenVPN > Validating certificate key usage . 2016.10.15 20:29:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.15 20:29:28 - OpenVPN > VERIFY KU OK . 2016.10.15 20:29:28 - OpenVPN > Validating certificate extended key usage . 2016.10.15 20:29:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.15 20:29:28 - OpenVPN > VERIFY EKU OK . 2016.10.15 20:29:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.15 20:29:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:29:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:29:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:29:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:29:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.15 20:29:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443 . 2016.10.15 20:29:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.15 20:29:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.83.102 255.255.0.0' . 2016.10.15 20:29:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.15 20:29:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.15 20:29:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.15 20:29:31 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.15 20:29:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.15 20:29:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.15 20:29:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.15 20:29:31 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.15 20:29:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{52BD8FEC-7AFC-4261-8D1E-7D3661603D70}.tap . 2016.10.15 20:29:31 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.10.15 20:29:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.83.102/255.255.0.0 [SUCCEEDED] . 2016.10.15 20:29:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.83.102/255.255.0.0 on interface {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.15 20:29:31 - OpenVPN > Successful ARP Flush on interface [10] {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} . 2016.10.15 20:29:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.15 20:29:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:29:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 13 . 2016.10.15 20:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:29:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:29:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:29:36 - Starting Management Interface . 2016.10.15 20:29:36 - OpenVPN > Initialization Sequence Completed I 2016.10.15 20:29:36 - DNS of a network adapter forced (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:29:36 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.10.15 20:29:36 - Flushing DNS I 2016.10.15 20:29:36 - Checking route W 2016.10.15 20:30:26 - Timeout für Vorgang überschritten ! 2016.10.15 20:30:26 - Disconnecting . 2016.10.15 20:30:26 - Management - Send 'signal SIGTERM' . 2016.10.15 20:30:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.15 20:30:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.15 20:30:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.15 20:30:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:30:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:30:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:30:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:30:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:30:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:30:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:30:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:30:31 - OpenVPN > Closing TUN/TAP interface . 2016.10.15 20:30:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.15 20:30:31 - Connection terminated. I 2016.10.15 20:30:31 - DNS of a network adapter restored to original settings (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:30:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.10.15 20:30:31 - Cancel requested. I 2016.10.15 20:30:31 - IPv6 restored. ! 2016.10.15 20:30:31 - Session terminated. I 2016.10.15 20:32:56 - Session starting. I 2016.10.15 20:32:56 - IPv6 disabled. I 2016.10.15 20:32:56 - Checking authorization ... ! 2016.10.15 20:32:57 - Connecting to Aquilae (Germany, Frankfurt) . 2016.10.15 20:32:57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.10.15 20:32:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.10.15 20:32:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.15 20:32:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.15 20:32:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:32:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:32:57 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.10.15 20:32:57 - OpenVPN > UDPv4 link local: [undef] . 2016.10.15 20:32:57 - OpenVPN > UDPv4 link remote: [AF_INET]46.165.208.70:443 . 2016.10.15 20:32:57 - OpenVPN > TLS: Initial packet from [AF_INET]46.165.208.70:443, sid=6a742afe 3ab6439b . 2016.10.15 20:32:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.15 20:32:57 - OpenVPN > Validating certificate key usage . 2016.10.15 20:32:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.15 20:32:57 - OpenVPN > VERIFY KU OK . 2016.10.15 20:32:57 - OpenVPN > Validating certificate extended key usage . 2016.10.15 20:32:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.15 20:32:57 - OpenVPN > VERIFY EKU OK . 2016.10.15 20:32:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.15 20:32:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:32:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:32:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:32:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:32:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.15 20:32:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.165.208.70:443 . 2016.10.15 20:33:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.15 20:33:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.31.194 255.255.0.0' . 2016.10.15 20:33:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.15 20:33:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.15 20:33:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.15 20:33:02 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.15 20:33:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.15 20:33:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.15 20:33:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.15 20:33:02 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.15 20:33:02 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{52BD8FEC-7AFC-4261-8D1E-7D3661603D70}.tap . 2016.10.15 20:33:02 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.10.15 20:33:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.31.194/255.255.0.0 [SUCCEEDED] . 2016.10.15 20:33:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.31.194/255.255.0.0 on interface {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.15 20:33:02 - OpenVPN > Successful ARP Flush on interface [10] {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} . 2016.10.15 20:33:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.15 20:33:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 46.165.208.70 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:33:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:33:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:33:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 13 . 2016.10.15 20:33:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:33:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:33:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:33:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:33:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:33:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:33:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:33:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:33:07 - Starting Management Interface . 2016.10.15 20:33:07 - OpenVPN > Initialization Sequence Completed I 2016.10.15 20:33:07 - Flushing DNS I 2016.10.15 20:33:07 - Checking route W 2016.10.15 20:33:57 - Timeout für Vorgang überschritten ! 2016.10.15 20:33:57 - Disconnecting . 2016.10.15 20:33:57 - Management - Send 'signal SIGTERM' . 2016.10.15 20:33:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.15 20:33:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.15 20:33:57 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.10.15 20:33:57 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.15 20:34:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 46.165.208.70 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:34:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:34:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:34:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:34:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:34:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:34:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:34:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:34:02 - OpenVPN > Closing TUN/TAP interface . 2016.10.15 20:34:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.15 20:34:02 - Connection terminated. I 2016.10.15 20:34:04 - Cancel requested. I 2016.10.15 20:34:04 - IPv6 restored. ! 2016.10.15 20:34:04 - Session terminated. I 2016.10.15 20:37:42 - Session starting. I 2016.10.15 20:37:42 - IPv6 disabled. I 2016.10.15 20:37:42 - Checking authorization ... ! 2016.10.15 20:37:42 - Connecting to Atik (Netherlands, Alblasserdam) . 2016.10.15 20:37:42 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015 . 2016.10.15 20:37:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.10.15 20:37:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.15 20:37:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.15 20:37:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:37:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:37:42 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072] . 2016.10.15 20:37:42 - OpenVPN > UDPv4 link local: [undef] . 2016.10.15 20:37:42 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443 . 2016.10.15 20:37:42 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=8f63b084 a85d8469 . 2016.10.15 20:37:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.15 20:37:42 - OpenVPN > Validating certificate key usage . 2016.10.15 20:37:42 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.15 20:37:42 - OpenVPN > VERIFY KU OK . 2016.10.15 20:37:42 - OpenVPN > Validating certificate extended key usage . 2016.10.15 20:37:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.15 20:37:42 - OpenVPN > VERIFY EKU OK . 2016.10.15 20:37:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.15 20:37:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:37:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:37:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.15 20:37:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.15 20:37:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.15 20:37:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443 . 2016.10.15 20:37:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.15 20:37:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.83.102 255.255.0.0' . 2016.10.15 20:37:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.15 20:37:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.15 20:37:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.15 20:37:50 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.15 20:37:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.15 20:37:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.15 20:37:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.15 20:37:50 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.15 20:37:50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{52BD8FEC-7AFC-4261-8D1E-7D3661603D70}.tap . 2016.10.15 20:37:50 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.10.15 20:37:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.83.102/255.255.0.0 [SUCCEEDED] . 2016.10.15 20:37:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.83.102/255.255.0.0 on interface {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.15 20:37:50 - OpenVPN > Successful ARP Flush on interface [10] {52BD8FEC-7AFC-4261-8D1E-7D3661603D70} . 2016.10.15 20:37:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.15 20:37:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:37:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:37:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:37:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 13 . 2016.10.15 20:37:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2016.10.15 20:37:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:37:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:37:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:37:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:37:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:37:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.15 20:37:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.15 20:37:55 - Starting Management Interface . 2016.10.15 20:37:55 - OpenVPN > Initialization Sequence Completed I 2016.10.15 20:37:55 - DNS of a network adapter forced (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:37:55 - DNS of a network adapter forced (TAP-Windows Adapter V9) I 2016.10.15 20:37:55 - Flushing DNS I 2016.10.15 20:37:55 - Checking route W 2016.10.15 20:38:45 - Timeout für Vorgang überschritten ! 2016.10.15 20:38:45 - Disconnecting . 2016.10.15 20:38:45 - Management - Send 'signal SIGTERM' . 2016.10.15 20:38:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.15 20:38:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.15 20:38:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.15 20:38:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.9 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:38:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:38:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1 . 2016.10.15 20:38:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:38:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:38:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:38:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.15 20:38:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.15 20:38:50 - OpenVPN > Closing TUN/TAP interface . 2016.10.15 20:38:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.15 20:38:50 - Connection terminated. I 2016.10.15 20:38:50 - DNS of a network adapter restored to original settings (ASUS USB-AC56 802.11ac Wireless USB Adapter) I 2016.10.15 20:38:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) I 2016.10.15 20:38:50 - Cancel requested. I 2016.10.15 20:38:50 - IPv6 restored. ! 2016.10.15 20:38:50 - Session terminated. Quote Share this post Link to post
h3h3y9 1 Posted ... Searched and found this:https://airvpn.org/topic/19205-unable-to-connect-to-server/?hl=%2Bchecking+%2Broute&do=findComment&comment=47836 Worked for me as a solution Preferences -> Protocols -> Click on "Protocol TCP Port 443" Works now! Sorry for the circumstances 1 OpenSourcerer reacted to this Quote Share this post Link to post