Jump to content
Not connected, Your IP: 3.208.22.127
polki8*9

Airvpn can't find route (DNS resolving due Intel VT-x)

Recommended Posts

Hi,

 

I got an issue. When i enable Intel VT-x in my bios, the next time i boot my pc, AirVPN can't resolve the route.

 

It does set the ip address correct on the TAP v9 adapter. in the 10.x.x.x range and it does set the dns correct on that adapter.

My TAP v9 adapter doesn't get a default gateway. Normal?

On my physical adapter(virtualized Hyper-V adapter) it does set the DNS correct, but my ip address is still the same (192.168.0.x). Is this normal?

 

AirVPN does a correct dns flush on the adapters. then it goes on checking the route. and fails. theres a screenshot attached.

I also dissabled IPv6 on all adapters.

 

Do u need more info? I'll be happy to give.

Any help is much appreciated.

 

Thanks

Share this post


Link to post

Do u need more info? I'll be happy to give.

 

Your first lesson is to learn that screenshots rarely help with troubleshooting. What really counts is that pesky text output from OpenVPN: Logs.

You could disable the route checks and check if you're good to go via ipleak.net.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

I am able to connect 1/20 of the time, very strange that a can connect sometimes. Please help.

 

The mighty LOGS:

 

I 2016.12.01 11:07:42 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.12.01 11:07:42 - Reading options from C:\Users\Tristan\AppData\Local\AirVPN\AirVPN.xml
. 2016.12.01 11:07:42 - Data Path: C:\Users\Tristan\AppData\Local\AirVPN
. 2016.12.01 11:07:42 - App Path: C:\Program Files\AirVPN
. 2016.12.01 11:07:42 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.01 11:07:42 - Command line arguments (1): path="home"
. 2016.12.01 11:07:42 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.12.01 11:07:42 - Updating systems & servers data ...
I 2016.12.01 11:07:42 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.12.01 11:07:42 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.01 11:07:42 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.01 11:07:42 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
I 2016.12.01 11:07:42 - Session starting.
I 2016.12.01 11:07:42 - IPv6 disabled.
. 2016.12.01 11:07:43 - Systems & servers data update completed
I 2016.12.01 11:07:50 - Checking authorization ...
! 2016.12.01 11:07:51 - Connecting to Subra (Netherlands, Alblasserdam)
. 2016.12.01 11:07:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.01 11:07:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.01 11:07:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 11:07:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 11:07:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:07:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:07:51 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.01 11:07:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.162.98:443 [nonblock]
. 2016.12.01 11:07:52 - OpenVPN > TCP connection established with [AF_INET]213.152.162.98:443
. 2016.12.01 11:07:52 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 11:07:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.162.98:443
. 2016.12.01 11:07:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=22574a6f 78f017cb
. 2016.12.01 11:07:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 11:07:52 - OpenVPN > Validating certificate key usage
. 2016.12.01 11:07:52 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.01 11:07:52 - OpenVPN > VERIFY KU OK
. 2016.12.01 11:07:52 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 11:07:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 11:07:52 - OpenVPN > VERIFY EKU OK
. 2016.12.01 11:07:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 11:07:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:07:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:07:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:07:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:07:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 11:07:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443
. 2016.12.01 11:07:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 11:07:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.7.58 255.255.0.0'
. 2016.12.01 11:07:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 11:07:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 11:07:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 11:07:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 11:07:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 11:07:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 11:07:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 11:07:55 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 11:07:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B5891F1E-FAB6-47BD-B99A-F6883EE07645}.tap
. 2016.12.01 11:07:55 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.01 11:07:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.7.58/255.255.0.0 [sUCCEEDED]
. 2016.12.01 11:07:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.7.58/255.255.0.0 on interface {B5891F1E-FAB6-47BD-B99A-F6883EE07645} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2016.12.01 11:07:55 - OpenVPN > Successful ARP Flush on interface [17] {B5891F1E-FAB6-47BD-B99A-F6883EE07645}
. 2016.12.01 11:08:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.01 11:08:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.98 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:08:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:08:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:00 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 19
. 2016.12.01 11:08:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:08:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:08:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:08:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:08:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:08:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:00 - Starting Management Interface
. 2016.12.01 11:08:00 - OpenVPN > Initialization Sequence Completed
I 2016.12.01 11:08:01 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.01 11:08:01 - DNS of a network adapter forced (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:08:01 - Flushing DNS
I 2016.12.01 11:08:01 - Checking route
W 2016.12.01 11:08:13 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.01 11:08:25 - Checking route, 2° try failed (The operation has timed out)
W 2016.12.01 11:08:25 - Checking route, 3° try failed (The remote name could not be resolved: 'subra_exit.airservers.org')
W 2016.12.01 11:08:25 - Checking route, 4° try failed (The remote name could not be resolved: 'subra_exit.airservers.org')
W 2016.12.01 11:08:25 - Checking route, 5° try failed (The remote name could not be resolved: 'subra_exit.airservers.org')
W 2016.12.01 11:08:25 - The remote name could not be resolved: 'subra_exit.airservers.org'
! 2016.12.01 11:08:25 - Disconnecting
. 2016.12.01 11:08:25 - Management - Send 'signal SIGTERM'
. 2016.12.01 11:08:25 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 11:08:25 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.98 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:08:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:25 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 11:08:25 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:08:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:25 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:08:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:25 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:08:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:25 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 11:08:25 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 11:08:25 - Connection terminated.
I 2016.12.01 11:08:25 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.01 11:08:25 - DNS of a network adapter restored to original settings (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:08:25 - Cancel requested.
I 2016.12.01 11:08:25 - IPv6 restored.
! 2016.12.01 11:08:25 - Session terminated.
. 2016.12.01 11:08:29 - Updating systems & servers data ...
. 2016.12.01 11:08:29 - Systems & servers data update completed
I 2016.12.01 11:08:37 - Session starting.
I 2016.12.01 11:08:37 - IPv6 disabled.
I 2016.12.01 11:08:37 - Checking authorization ...
! 2016.12.01 11:08:37 - Connecting to Diadema (Belgium, Brussels)
. 2016.12.01 11:08:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.01 11:08:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.01 11:08:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 11:08:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 11:08:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:08:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:08:46 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.01 11:08:46 - OpenVPN > Attempting to establish TCP connection with [AF_INET]194.187.251.162:443 [nonblock]
. 2016.12.01 11:08:47 - OpenVPN > TCP connection established with [AF_INET]194.187.251.162:443
. 2016.12.01 11:08:47 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 11:08:47 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]194.187.251.162:443
. 2016.12.01 11:08:47 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.162:443, sid=bba806b7 64358b2b
. 2016.12.01 11:08:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 11:08:47 - OpenVPN > Validating certificate key usage
. 2016.12.01 11:08:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.01 11:08:47 - OpenVPN > VERIFY KU OK
. 2016.12.01 11:08:47 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 11:08:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 11:08:47 - OpenVPN > VERIFY EKU OK
. 2016.12.01 11:08:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 11:08:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:08:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:08:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:08:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:08:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 11:08:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]194.187.251.162:443
. 2016.12.01 11:08:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 11:08:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.47 255.255.0.0'
. 2016.12.01 11:08:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 11:08:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 11:08:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 11:08:50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 11:08:50 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 11:08:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 11:08:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 11:08:50 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 11:08:50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B5891F1E-FAB6-47BD-B99A-F6883EE07645}.tap
. 2016.12.01 11:08:50 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.01 11:08:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.0.47/255.255.0.0 [sUCCEEDED]
. 2016.12.01 11:08:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.47/255.255.0.0 on interface {B5891F1E-FAB6-47BD-B99A-F6883EE07645} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2016.12.01 11:08:50 - OpenVPN > Successful ARP Flush on interface [17] {B5891F1E-FAB6-47BD-B99A-F6883EE07645}
. 2016.12.01 11:08:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.01 11:08:55 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.162 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:08:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:08:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 19
. 2016.12.01 11:08:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:08:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:08:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:08:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:08:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:08:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:08:55 - Starting Management Interface
. 2016.12.01 11:08:55 - OpenVPN > Initialization Sequence Completed
I 2016.12.01 11:08:55 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.01 11:08:55 - DNS of a network adapter forced (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:08:55 - Flushing DNS
I 2016.12.01 11:08:55 - Checking route
W 2016.12.01 11:09:07 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.01 11:09:07 - Checking route, 2° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:07 - Checking route, 3° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:07 - Checking route, 4° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:07 - Checking route, 5° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:07 - The remote name could not be resolved: 'diadema_exit.airservers.org'
! 2016.12.01 11:09:07 - Disconnecting
. 2016.12.01 11:09:07 - Management - Send 'signal SIGTERM'
. 2016.12.01 11:09:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 11:09:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 11:09:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 194.187.251.162 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:09:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:09:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:09:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:07 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:09:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:07 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 11:09:07 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 11:09:07 - Connection terminated.
I 2016.12.01 11:09:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.01 11:09:07 - DNS of a network adapter restored to original settings (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:09:09 - Cancel requested.
I 2016.12.01 11:09:09 - IPv6 restored.
! 2016.12.01 11:09:09 - Session terminated.
I 2016.12.01 11:09:22 - Session starting.
I 2016.12.01 11:09:22 - IPv6 disabled.
I 2016.12.01 11:09:22 - Checking authorization ...
! 2016.12.01 11:09:23 - Connecting to Diadema (Belgium, Brussels)
. 2016.12.01 11:09:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.01 11:09:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.01 11:09:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 11:09:33 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 11:09:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:09:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:09:33 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.01 11:09:33 - OpenVPN > Attempting to establish TCP connection with [AF_INET]194.187.251.162:443 [nonblock]
. 2016.12.01 11:09:34 - OpenVPN > TCP connection established with [AF_INET]194.187.251.162:443
. 2016.12.01 11:09:34 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 11:09:34 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]194.187.251.162:443
. 2016.12.01 11:09:34 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.162:443, sid=89d99876 2d3fea1d
. 2016.12.01 11:09:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 11:09:34 - OpenVPN > Validating certificate key usage
. 2016.12.01 11:09:34 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.01 11:09:34 - OpenVPN > VERIFY KU OK
. 2016.12.01 11:09:34 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 11:09:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 11:09:34 - OpenVPN > VERIFY EKU OK
. 2016.12.01 11:09:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 11:09:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:09:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:09:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:09:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:09:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 11:09:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]194.187.251.162:443
. 2016.12.01 11:09:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 11:09:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.47 255.255.0.0'
. 2016.12.01 11:09:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 11:09:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 11:09:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 11:09:37 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 11:09:37 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 11:09:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 11:09:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 11:09:37 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 11:09:37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B5891F1E-FAB6-47BD-B99A-F6883EE07645}.tap
. 2016.12.01 11:09:37 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.01 11:09:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.0.47/255.255.0.0 [sUCCEEDED]
. 2016.12.01 11:09:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.47/255.255.0.0 on interface {B5891F1E-FAB6-47BD-B99A-F6883EE07645} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2016.12.01 11:09:37 - OpenVPN > Successful ARP Flush on interface [17] {B5891F1E-FAB6-47BD-B99A-F6883EE07645}
. 2016.12.01 11:09:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.01 11:09:42 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.162 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:09:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:09:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:42 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 19
. 2016.12.01 11:09:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:09:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:09:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:09:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:09:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:09:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:42 - Starting Management Interface
. 2016.12.01 11:09:42 - OpenVPN > Initialization Sequence Completed
I 2016.12.01 11:09:42 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.01 11:09:42 - DNS of a network adapter forced (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:09:42 - Flushing DNS
I 2016.12.01 11:09:42 - Checking route
W 2016.12.01 11:09:54 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.01 11:09:54 - Checking route, 2° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:54 - Checking route, 3° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:54 - Checking route, 4° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:54 - Checking route, 5° try failed (The remote name could not be resolved: 'diadema_exit.airservers.org')
W 2016.12.01 11:09:54 - The remote name could not be resolved: 'diadema_exit.airservers.org'
! 2016.12.01 11:09:54 - Disconnecting
. 2016.12.01 11:09:54 - Management - Send 'signal SIGTERM'
. 2016.12.01 11:09:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 11:09:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 11:09:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 194.187.251.162 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:09:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:09:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:09:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:09:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:09:54 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 11:09:54 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 11:09:54 - Connection terminated.
I 2016.12.01 11:09:54 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.01 11:09:54 - DNS of a network adapter restored to original settings (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:09:57 - Checking authorization ...
! 2016.12.01 11:09:58 - Connecting to Garnet (Netherlands, Alblasserdam)
. 2016.12.01 11:09:58 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.01 11:09:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.01 11:10:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 11:10:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 11:10:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:10:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:10:08 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.01 11:10:08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.162.73:443 [nonblock]
. 2016.12.01 11:10:09 - OpenVPN > TCP connection established with [AF_INET]213.152.162.73:443
. 2016.12.01 11:10:09 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 11:10:09 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.162.73:443
. 2016.12.01 11:10:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.73:443, sid=c6d5fdfb 4a8d56a3
. 2016.12.01 11:10:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 11:10:09 - OpenVPN > Validating certificate key usage
. 2016.12.01 11:10:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.01 11:10:09 - OpenVPN > VERIFY KU OK
. 2016.12.01 11:10:09 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 11:10:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 11:10:09 - OpenVPN > VERIFY EKU OK
. 2016.12.01 11:10:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 11:10:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:10:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:10:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:10:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:10:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 11:10:11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.73:443
. 2016.12.01 11:10:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 11:10:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.6.226 255.255.0.0'
. 2016.12.01 11:10:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 11:10:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 11:10:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 11:10:13 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 11:10:13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 11:10:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 11:10:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 11:10:13 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 11:10:13 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B5891F1E-FAB6-47BD-B99A-F6883EE07645}.tap
. 2016.12.01 11:10:13 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.01 11:10:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.6.226/255.255.0.0 [sUCCEEDED]
. 2016.12.01 11:10:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.6.226/255.255.0.0 on interface {B5891F1E-FAB6-47BD-B99A-F6883EE07645} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2016.12.01 11:10:13 - OpenVPN > Successful ARP Flush on interface [17] {B5891F1E-FAB6-47BD-B99A-F6883EE07645}
. 2016.12.01 11:10:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.01 11:10:18 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.73 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:10:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:10:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:18 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 19
. 2016.12.01 11:10:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:10:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:18 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:10:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:10:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:18 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:10:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:10:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:18 - Starting Management Interface
. 2016.12.01 11:10:18 - OpenVPN > Initialization Sequence Completed
I 2016.12.01 11:10:18 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.01 11:10:18 - DNS of a network adapter forced (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:10:18 - Flushing DNS
I 2016.12.01 11:10:18 - Checking route
W 2016.12.01 11:10:30 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.01 11:10:30 - Checking route, 2° try failed (The remote name could not be resolved: 'garnet_exit.airservers.org')
W 2016.12.01 11:10:30 - Checking route, 3° try failed (The remote name could not be resolved: 'garnet_exit.airservers.org')
W 2016.12.01 11:10:30 - Checking route, 4° try failed (The remote name could not be resolved: 'garnet_exit.airservers.org')
W 2016.12.01 11:10:30 - Checking route, 5° try failed (The remote name could not be resolved: 'garnet_exit.airservers.org')
W 2016.12.01 11:10:30 - The remote name could not be resolved: 'garnet_exit.airservers.org'
! 2016.12.01 11:10:30 - Disconnecting
. 2016.12.01 11:10:30 - Management - Send 'signal SIGTERM'
. 2016.12.01 11:10:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 11:10:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 11:10:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.73 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:10:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:10:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:10:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:10:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:10:30 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 11:10:30 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 11:10:30 - Connection terminated.
I 2016.12.01 11:10:30 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.01 11:10:30 - DNS of a network adapter restored to original settings (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:10:30 - Cancel requested.
I 2016.12.01 11:10:30 - IPv6 restored.
! 2016.12.01 11:10:30 - Session terminated.
. 2016.12.01 11:10:56 - Updating systems & servers data ...
. 2016.12.01 11:10:56 - Systems & servers data update completed
I 2016.12.01 11:11:12 - Session starting.
I 2016.12.01 11:11:12 - IPv6 disabled.
I 2016.12.01 11:11:12 - Checking authorization ...
! 2016.12.01 11:11:12 - Connecting to Ancha (Netherlands, Alblasserdam)
. 2016.12.01 11:11:12 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.01 11:11:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.01 11:11:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 11:11:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 11:11:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:11:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:11:18 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.01 11:11:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.162.164:443 [nonblock]
. 2016.12.01 11:11:19 - OpenVPN > TCP connection established with [AF_INET]213.152.162.164:443
. 2016.12.01 11:11:19 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 11:11:19 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.162.164:443
. 2016.12.01 11:11:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=378dbd3b 7932db26
. 2016.12.01 11:11:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 11:11:19 - OpenVPN > Validating certificate key usage
. 2016.12.01 11:11:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.01 11:11:19 - OpenVPN > VERIFY KU OK
. 2016.12.01 11:11:19 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 11:11:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 11:11:19 - OpenVPN > VERIFY EKU OK
. 2016.12.01 11:11:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 11:11:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:11:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:11:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:11:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:11:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 11:11:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443
. 2016.12.01 11:11:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 11:11:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.6.82 255.255.0.0'
. 2016.12.01 11:11:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 11:11:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 11:11:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 11:11:23 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 11:11:23 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 11:11:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 11:11:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 11:11:23 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 11:11:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B5891F1E-FAB6-47BD-B99A-F6883EE07645}.tap
. 2016.12.01 11:11:23 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.01 11:11:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.6.82/255.255.0.0 [sUCCEEDED]
. 2016.12.01 11:11:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.6.82/255.255.0.0 on interface {B5891F1E-FAB6-47BD-B99A-F6883EE07645} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2016.12.01 11:11:23 - OpenVPN > Successful ARP Flush on interface [17] {B5891F1E-FAB6-47BD-B99A-F6883EE07645}
. 2016.12.01 11:11:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.01 11:11:28 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.164 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:11:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:11:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:11:28 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 19
. 2016.12.01 11:11:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:11:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:11:28 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:11:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:11:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:11:28 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:11:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:11:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:11:28 - Starting Management Interface
. 2016.12.01 11:11:28 - OpenVPN > Initialization Sequence Completed
I 2016.12.01 11:11:28 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.01 11:11:28 - DNS of a network adapter forced (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:11:28 - Flushing DNS
I 2016.12.01 11:11:28 - Checking route
W 2016.12.01 11:11:40 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.01 11:11:52 - Checking route, 2° try failed (The operation has timed out)
W 2016.12.01 11:12:04 - Checking route, 3° try failed (The operation has timed out)
W 2016.12.01 11:12:04 - Checking route, 4° try failed (The remote name could not be resolved: 'ancha_exit.airservers.org')
W 2016.12.01 11:12:04 - Checking route, 5° try failed (The remote name could not be resolved: 'ancha_exit.airservers.org')
W 2016.12.01 11:12:04 - The remote name could not be resolved: 'ancha_exit.airservers.org'
! 2016.12.01 11:12:05 - Disconnecting
. 2016.12.01 11:12:05 - Management - Send 'signal SIGTERM'
. 2016.12.01 11:12:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 11:12:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 11:12:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.164 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:12:05 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.12.01 11:12:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:12:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:12:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:12:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:05 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 11:12:05 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 11:12:05 - Connection terminated.
I 2016.12.01 11:12:05 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.01 11:12:05 - DNS of a network adapter restored to original settings (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:12:05 - Cancel requested.
I 2016.12.01 11:12:05 - IPv6 restored.
! 2016.12.01 11:12:05 - Session terminated.
. 2016.12.01 11:12:28 - Updating systems & servers data ...
. 2016.12.01 11:12:28 - Systems & servers data update completed
I 2016.12.01 11:12:30 - Session starting.
I 2016.12.01 11:12:31 - IPv6 disabled.
I 2016.12.01 11:12:31 - Checking authorization ...
! 2016.12.01 11:12:31 - Connecting to Diphda (Netherlands, Alblasserdam)
. 2016.12.01 11:12:31 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.01 11:12:31 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.01 11:12:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 11:12:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 11:12:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:12:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:12:41 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.01 11:12:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.164:443 [nonblock]
. 2016.12.01 11:12:42 - OpenVPN > TCP connection established with [AF_INET]213.152.161.164:443
. 2016.12.01 11:12:42 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 11:12:42 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.164:443
. 2016.12.01 11:12:42 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=79a98759 a0be6a15
. 2016.12.01 11:12:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 11:12:42 - OpenVPN > Validating certificate key usage
. 2016.12.01 11:12:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.01 11:12:42 - OpenVPN > VERIFY KU OK
. 2016.12.01 11:12:42 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 11:12:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 11:12:42 - OpenVPN > VERIFY EKU OK
. 2016.12.01 11:12:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 11:12:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:12:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:12:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 11:12:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 11:12:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 11:12:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443
. 2016.12.01 11:12:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 11:12:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.7.217 255.255.0.0'
. 2016.12.01 11:12:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 11:12:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 11:12:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 11:12:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 11:12:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 11:12:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 11:12:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 11:12:46 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 11:12:46 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B5891F1E-FAB6-47BD-B99A-F6883EE07645}.tap
. 2016.12.01 11:12:46 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.01 11:12:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.7.217/255.255.0.0 [sUCCEEDED]
. 2016.12.01 11:12:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.7.217/255.255.0.0 on interface {B5891F1E-FAB6-47BD-B99A-F6883EE07645} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2016.12.01 11:12:46 - OpenVPN > Successful ARP Flush on interface [17] {B5891F1E-FAB6-47BD-B99A-F6883EE07645}
. 2016.12.01 11:12:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.01 11:12:51 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.164 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:12:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:12:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:51 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 19
. 2016.12.01 11:12:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.01 11:12:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:12:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:12:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:12:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.01 11:12:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 11:12:51 - Starting Management Interface
. 2016.12.01 11:12:51 - OpenVPN > Initialization Sequence Completed
I 2016.12.01 11:12:51 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.01 11:12:51 - DNS of a network adapter forced (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:12:51 - Flushing DNS
I 2016.12.01 11:12:51 - Checking route
W 2016.12.01 11:13:03 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.01 11:13:03 - Checking route, 2° try failed (The remote name could not be resolved: 'diphda_exit.airservers.org')
W 2016.12.01 11:13:03 - Checking route, 3° try failed (The remote name could not be resolved: 'diphda_exit.airservers.org')
W 2016.12.01 11:13:03 - Checking route, 4° try failed (The remote name could not be resolved: 'diphda_exit.airservers.org')
W 2016.12.01 11:13:03 - Checking route, 5° try failed (The remote name could not be resolved: 'diphda_exit.airservers.org')
W 2016.12.01 11:13:03 - The remote name could not be resolved: 'diphda_exit.airservers.org'
! 2016.12.01 11:13:04 - Disconnecting
. 2016.12.01 11:13:04 - Management - Send 'signal SIGTERM'
. 2016.12.01 11:13:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 11:13:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 11:13:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.164 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:13:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:13:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 11:13:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:13:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:13:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:13:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2016.12.01 11:13:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 11:13:04 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 11:13:04 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 11:13:04 - Connection terminated.
I 2016.12.01 11:13:04 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.01 11:13:04 - DNS of a network adapter restored to original settings (Hyper-V Virtual Ethernet Adapter)
I 2016.12.01 11:13:07 - Cancel requested.
I 2016.12.01 11:13:07 - IPv6 restored.
! 2016.12.01 11:13:07 - Session terminated.
 

Share this post


Link to post

Hi,

 

I got an issue. When i enable Intel VT-x in my bios, the next time i boot my pc, AirVPN can't resolve the route.

 

 

Hello,

 

can you reliably verify that with VT-x disabled the route check is always (or most of the times) successful? Is this surely the only BIOS setting that you vary to get a different Eddie behavior?

 

Do you run Eddie in some VM?

 

Can you please upgrade to Eddie 2.11.8beta and verify whether the problem remains the same (with VT-x enabled)?

 

To download the latest Eddie beta version please see here:

https://airvpn.org/topic/18625-eddie-211beta-available/

 

Kind regards

Share this post


Link to post

Hi there,

 

Even with VT-x dissabled and deleting my 'Bridge-To-Wired' Hyper-V adaptor, i had still problems to connect with my normal ethernet adaptor & the beta release from Eddie.

Then back to normal. delete airvpn & TAP, Re-enbled VT-x, recreate hyper-v switch, install airvpn. and now i am able to connect with Eddie 2.11.8beta.

Unexplainable! But im happy tho . I will post the mighty logs if u need them!

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...