Jump to content
Not connected, Your IP: 52.15.191.241
kis2x

Can't use TAP driver with my wifi network

Recommended Posts

I need some help setting up VPN software. So I have a wifi network in the office. You have to use proxy to access internet with this wifi, otherwise it simply doesn't work. So far I've tried VPN services like tunnelbear and airvpn. Both of them install TAP driver and I can't connect to any server (there're no errors, they just keep connecting). However, when I tried hotspot shield vpn, which didn't install anyting but the app itself, it worked just fine. Is there anything I can do with this TAP driver to make airvpn work? Or what other solution can you recommend?

Thank you adn sorry for my English^^

Share this post


Link to post

Hello!

 

Welcome to AirVPN.

 

If you're using the AirVPN Eddie client (Which I recommend), you can try using different protocols, in the preferences area. Especially protocols like TCP 443, which attempt to hide the VPN connection. Otherwise, there may be portable versions of the Air client that you could try. If you've got problems with downloads, you could download the Air software onto a USB stick and take it into the office as well - it comes with the TAP drivers and the other things you need.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

hotspot shield VPN probably uses L2TP, not openvpn.  Thus no need for it to install the TAP driver, which is necessary for openvpn.

 

anyway, the airvpn client will certainly have logs which will help us figure out the problem.

Share this post


Link to post

Hello!

 

Welcome to AirVPN.

 

If you're using the AirVPN Eddie client (Which I recommend), you can try using different protocols, in the preferences area. Especially protocols like TCP 443, which attempt to hide the VPN connection. Otherwise, there may be portable versions of the Air client that you could try. If you've got problems with downloads, you could download the Air software onto a USB stick and take it into the office as well - it comes with the TAP drivers and the other things you need.

 

hotspot shield VPN probably uses L2TP, not openvpn.  Thus no need for it to install the TAP driver, which is necessary for openvpn.

 

anyway, the airvpn client will certainly have logs which will help us figure out the problem.

 

Yes, I'm using Eddie client. I've tried using 2 different TCP protocols (one of them is 443) but it didn't work. It seems the only way I can connect to a server is by putting the proxy I have to use to access the internet in the AirVPN clients preferences. This way I can access blocked websites, but it actually shows my real location. Can I fix this somehow? If no, how safe is that to use VPN this way?

 

And here's the log I got after trying to connect to a recommended server using TCP 443 and no proxy set in the preferences.

 

I 2016.10.29 17:10:15 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64

. 2016.10.29 17:10:15 - Reading options from D:\airvpn_windows8_x64_portable\AirVPN.xml

. 2016.10.29 17:10:15 - Data Path: D:\airvpn_windows8_x64_portable

. 2016.10.29 17:10:15 - App Path: D:\airvpn_windows8_x64_portable

. 2016.10.29 17:10:15 - Executable Path: D:\airvpn_windows8_x64_portable\AirVPN.exe

. 2016.10.29 17:10:15 - Command line arguments (0):

. 2016.10.29 17:10:15 - Operating System: Microsoft Windows NT 6.2.9200.0

. 2016.10.29 17:10:15 - Updating systems & servers data ...

I 2016.10.29 17:10:16 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1

I 2016.10.29 17:10:16 - OpenVPN - Version: OpenVPN 2.3.8 (D:\airvpn_windows8_x64_portable\openvpn.exe)

I 2016.10.29 17:10:16 - SSH - Version: plink 0.63 (D:\airvpn_windows8_x64_portable\plink.exe)

I 2016.10.29 17:10:16 - SSL - Version: stunnel 5.17 (D:\airvpn_windows8_x64_portable\stunnel.exe)

! 2016.10.29 17:10:16 - Ready

. 2016.10.29 17:10:16 - Systems & servers data update completed

I 2016.10.29 17:10:25 - Session starting.

I 2016.10.29 17:10:25 - IPv6 disabled.

I 2016.10.29 17:11:26 - Checking authorization ...

! 2016.10.29 17:11:27 - Connecting to Nash (Netherlands, Alblasserdam)

. 2016.10.29 17:14:45 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015

. 2016.10.29 17:14:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.10.29 17:14:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.10.29 17:14:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.10.29 17:14:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:45 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]

. 2016.10.29 17:14:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.24:443 [nonblock]

. 2016.10.29 17:14:45 - OpenVPN > TCP connection established with [AF_INET]213.152.161.24:443

. 2016.10.29 17:14:45 - OpenVPN > TCPv4_CLIENT link local: [undef]

. 2016.10.29 17:14:45 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.24:443

. 2016.10.29 17:14:45 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.24:443, sid=78e3041f d39e1609

. 2016.10.29 17:14:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.10.29 17:14:45 - OpenVPN > Validating certificate key usage

. 2016.10.29 17:14:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.10.29 17:14:45 - OpenVPN > VERIFY KU OK

. 2016.10.29 17:14:45 - OpenVPN > Validating certificate extended key usage

. 2016.10.29 17:14:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.10.29 17:14:45 - OpenVPN > VERIFY EKU OK

. 2016.10.29 17:14:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.10.29 17:14:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:14:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:14:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.10.29 17:14:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.24:443

. 2016.10.29 17:14:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2016.10.29 17:14:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.7.31 255.255.0.0'

. 2016.10.29 17:14:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2016.10.29 17:14:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2016.10.29 17:14:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2016.10.29 17:14:45 - OpenVPN > OPTIONS IMPORT: route options modified

. 2016.10.29 17:14:45 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2016.10.29 17:14:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2016.10.29 17:14:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2016.10.29 17:14:45 - OpenVPN > open_tun, tt->ipv6=0

. 2016.10.29 17:14:45 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D8CDCD02-6D3A-455A-9C20-5FD497606919}.tap

. 2016.10.29 17:14:45 - OpenVPN > TAP-Windows Driver Version 9.21

. 2016.10.29 17:14:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.7.31/255.255.0.0 [sUCCEEDED]

. 2016.10.29 17:14:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.7.31/255.255.0.0 on interface {D8CDCD02-6D3A-455A-9C20-5FD497606919} [DHCP-serv: 10.5.255.254, lease-time: 31536000]

. 2016.10.29 17:14:45 - OpenVPN > Successful ARP Flush on interface [20] {D8CDCD02-6D3A-455A-9C20-5FD497606919}

. 2016.10.29 17:14:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2016.10.29 17:14:45 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.24 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:14:45 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17]

. 2016.10.29 17:14:45 - OpenVPN > Route addition via IPAPI failed [adaptive]

. 2016.10.29 17:14:45 - OpenVPN > Route addition fallback to route.exe

. 2016.10.29 17:14:45 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2016.10.29 17:14:45 - OpenVPN > C:\Windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:14:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2016.10.29 17:14:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:14:45 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:14:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2016.10.29 17:14:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:14:45 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:14:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2016.10.29 17:14:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:14:45 - Starting Management Interface

. 2016.10.29 17:14:45 - OpenVPN > Initialization Sequence Completed

. 2016.10.29 17:14:45 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2016.10.29 17:14:45 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2016.10.29 17:14:45 - OpenVPN > Restart pause, 5 second(s)

! 2016.10.29 17:14:45 - Disconnecting

I 2016.10.29 17:14:45 - DNS of a network adapter forced (Intel® Wireless-N 7260)

. 2016.10.29 17:14:45 - Management - Send 'signal SIGTERM'

. 2016.10.29 17:14:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2016.10.29 17:14:45 - Connection terminated.

I 2016.10.29 17:14:45 - DNS of a network adapter forced (TAP-Windows Adapter V9)

I 2016.10.29 17:14:45 - Flushing DNS

W 2016.10.29 17:14:46 - Waiting TUN interface

I 2016.10.29 17:14:48 - Checking authorization ...

! 2016.10.29 17:14:49 - Connecting to Nash (Netherlands, Alblasserdam)

. 2016.10.29 17:14:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015

. 2016.10.29 17:14:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.10.29 17:14:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.10.29 17:14:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.10.29 17:14:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:49 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]

. 2016.10.29 17:14:49 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.24:443 [nonblock]

W 2016.10.29 17:14:50 - Waiting TUN interface

. 2016.10.29 17:14:50 - OpenVPN > TCP connection established with [AF_INET]213.152.161.24:443

. 2016.10.29 17:14:50 - OpenVPN > TCPv4_CLIENT link local: [undef]

. 2016.10.29 17:14:50 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.24:443

. 2016.10.29 17:14:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.24:443, sid=83d5af90 39c33911

. 2016.10.29 17:14:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.10.29 17:14:50 - OpenVPN > Validating certificate key usage

. 2016.10.29 17:14:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.10.29 17:14:50 - OpenVPN > VERIFY KU OK

. 2016.10.29 17:14:50 - OpenVPN > Validating certificate extended key usage

. 2016.10.29 17:14:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.10.29 17:14:50 - OpenVPN > VERIFY EKU OK

. 2016.10.29 17:14:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

W 2016.10.29 17:14:52 - Waiting TUN interface

. 2016.10.29 17:14:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:14:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:14:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:14:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.10.29 17:14:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.24:443

W 2016.10.29 17:14:54 - Waiting TUN interface

. 2016.10.29 17:14:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2016.10.29 17:14:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.7.31 255.255.0.0'

. 2016.10.29 17:14:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2016.10.29 17:14:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2016.10.29 17:14:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2016.10.29 17:14:55 - OpenVPN > OPTIONS IMPORT: route options modified

. 2016.10.29 17:14:55 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2016.10.29 17:14:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2016.10.29 17:14:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2016.10.29 17:14:55 - OpenVPN > open_tun, tt->ipv6=0

. 2016.10.29 17:14:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D8CDCD02-6D3A-455A-9C20-5FD497606919}.tap

. 2016.10.29 17:14:55 - OpenVPN > TAP-Windows Driver Version 9.21

. 2016.10.29 17:14:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.7.31/255.255.0.0 [sUCCEEDED]

. 2016.10.29 17:14:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.7.31/255.255.0.0 on interface {D8CDCD02-6D3A-455A-9C20-5FD497606919} [DHCP-serv: 10.5.255.254, lease-time: 31536000]

. 2016.10.29 17:14:55 - OpenVPN > Successful ARP Flush on interface [20] {D8CDCD02-6D3A-455A-9C20-5FD497606919}

I 2016.10.29 17:14:56 - Checking route

. 2016.10.29 17:15:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2016.10.29 17:15:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.24 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:15:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17]

. 2016.10.29 17:15:00 - OpenVPN > Route addition via IPAPI failed [adaptive]

. 2016.10.29 17:15:00 - OpenVPN > Route addition fallback to route.exe

. 2016.10.29 17:15:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2016.10.29 17:15:00 - OpenVPN > C:\Windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:15:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17]

. 2016.10.29 17:15:00 - OpenVPN > Route addition via IPAPI failed [adaptive]

. 2016.10.29 17:15:00 - OpenVPN > Route addition fallback to route.exe

. 2016.10.29 17:15:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2016.10.29 17:15:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:15:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=20]

. 2016.10.29 17:15:00 - OpenVPN > Route addition via IPAPI failed [adaptive]

. 2016.10.29 17:15:00 - OpenVPN > Route addition fallback to route.exe

. 2016.10.29 17:15:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2016.10.29 17:15:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:15:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=20]

. 2016.10.29 17:15:00 - OpenVPN > Route addition via IPAPI failed [adaptive]

. 2016.10.29 17:15:00 - OpenVPN > Route addition fallback to route.exe

. 2016.10.29 17:15:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2016.10.29 17:15:00 - Starting Management Interface

. 2016.10.29 17:15:00 - OpenVPN > Initialization Sequence Completed

I 2016.10.29 17:15:00 - DNS of a network adapter forced (Intel® Wireless-N 7260)

I 2016.10.29 17:15:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)

I 2016.10.29 17:15:00 - Flushing DNS

I 2016.10.29 17:15:00 - Checking route

W 2016.10.29 17:15:47 - The operation has timed out

. 2016.10.29 17:15:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2016.10.29 17:15:47 - OpenVPN > MANAGEMENT: Client disconnected

! 2016.10.29 17:15:48 - Disconnecting

. 2016.10.29 17:15:48 - OpenVPN > Assertion failed at misc.c:779

. 2016.10.29 17:15:48 - Management - Send 'signal SIGTERM'

. 2016.10.29 17:15:48 - OpenVPN > Exiting due to fatal error

. 2016.10.29 17:15:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2016.10.29 17:15:48 - Connection terminated.

I 2016.10.29 17:15:48 - DNS of a network adapter restored to original settings (Intel® Wireless-N 7260)

I 2016.10.29 17:15:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)

I 2016.10.29 17:15:51 - Checking authorization ...

! 2016.10.29 17:15:51 - Connecting to Nash (Netherlands, Alblasserdam)

W 2016.10.29 17:15:51 - The operation has timed out

. 2016.10.29 17:15:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2016.10.29 17:15:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.24 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:15:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:15:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 1.1.1.1 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:15:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:15:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015

. 2016.10.29 17:15:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:15:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.10.29 17:15:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:15:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.10.29 17:15:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:15:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:15:51 - OpenVPN > Closing TUN/TAP interface

. 2016.10.29 17:15:51 - OpenVPN > SIGTERM[hard,] received, process exiting

! 2016.10.29 17:15:51 - Disconnecting

. 2016.10.29 17:15:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.10.29 17:15:51 - Connection terminated.

. 2016.10.29 17:15:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:15:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:15:51 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]

. 2016.10.29 17:15:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.24:443 [nonblock]

I 2016.10.29 17:15:54 - Checking authorization ...

! 2016.10.29 17:15:55 - Connecting to Nash (Netherlands, Alblasserdam)

. 2016.10.29 17:15:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015

. 2016.10.29 17:15:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.10.29 17:15:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.10.29 17:15:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.10.29 17:15:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:15:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:15:55 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]

. 2016.10.29 17:15:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.24:443 [nonblock]

. 2016.10.29 17:15:56 - OpenVPN > TCP connection established with [AF_INET]213.152.161.24:443

. 2016.10.29 17:15:56 - OpenVPN > TCPv4_CLIENT link local: [undef]

. 2016.10.29 17:15:56 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.24:443

. 2016.10.29 17:15:56 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.24:443, sid=0d33fc3c 36077315

. 2016.10.29 17:15:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.10.29 17:15:56 - OpenVPN > Validating certificate key usage

. 2016.10.29 17:15:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.10.29 17:15:56 - OpenVPN > VERIFY KU OK

. 2016.10.29 17:15:56 - OpenVPN > Validating certificate extended key usage

. 2016.10.29 17:15:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.10.29 17:15:56 - OpenVPN > VERIFY EKU OK

. 2016.10.29 17:15:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.10.29 17:15:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:15:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:15:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:15:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:15:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.10.29 17:15:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.24:443

. 2016.10.29 17:16:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2016.10.29 17:16:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.7.31 255.255.0.0'

. 2016.10.29 17:16:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2016.10.29 17:16:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2016.10.29 17:16:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2016.10.29 17:16:01 - OpenVPN > OPTIONS IMPORT: route options modified

. 2016.10.29 17:16:01 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2016.10.29 17:16:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2016.10.29 17:16:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2016.10.29 17:16:01 - OpenVPN > open_tun, tt->ipv6=0

. 2016.10.29 17:16:01 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D8CDCD02-6D3A-455A-9C20-5FD497606919}.tap

. 2016.10.29 17:16:01 - OpenVPN > TAP-Windows Driver Version 9.21

. 2016.10.29 17:16:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.7.31/255.255.0.0 [sUCCEEDED]

. 2016.10.29 17:16:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.7.31/255.255.0.0 on interface {D8CDCD02-6D3A-455A-9C20-5FD497606919} [DHCP-serv: 10.5.255.254, lease-time: 31536000]

. 2016.10.29 17:16:01 - OpenVPN > Successful ARP Flush on interface [20] {D8CDCD02-6D3A-455A-9C20-5FD497606919}

. 2016.10.29 17:16:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2016.10.29 17:16:06 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.24 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:16:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2016.10.29 17:16:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:06 - OpenVPN > C:\Windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:16:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2016.10.29 17:16:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:16:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2016.10.29 17:16:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:16:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2016.10.29 17:16:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:06 - Starting Management Interface

. 2016.10.29 17:16:06 - OpenVPN > Initialization Sequence Completed

I 2016.10.29 17:16:07 - DNS of a network adapter forced (Intel® Wireless-N 7260)

I 2016.10.29 17:16:07 - DNS of a network adapter forced (TAP-Windows Adapter V9)

I 2016.10.29 17:16:07 - Flushing DNS

I 2016.10.29 17:16:07 - Checking route

W 2016.10.29 17:16:57 - The operation has timed out

! 2016.10.29 17:16:57 - Disconnecting

. 2016.10.29 17:16:57 - Management - Send 'signal SIGTERM'

. 2016.10.29 17:16:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2016.10.29 17:16:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.24 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:16:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2016.10.29 17:16:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:57 - OpenVpn Management > SUCCESS: signal SIGTERM thrown

. 2016.10.29 17:16:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 1.1.1.1 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:16:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:16:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:16:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2016.10.29 17:16:58 - OpenVPN > Closing TUN/TAP interface

. 2016.10.29 17:16:58 - OpenVPN > SIGTERM[hard,] received, process exiting

. 2016.10.29 17:16:58 - Connection terminated.

I 2016.10.29 17:16:58 - DNS of a network adapter restored to original settings (Intel® Wireless-N 7260)

I 2016.10.29 17:16:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)

I 2016.10.29 17:17:01 - Checking authorization ...

! 2016.10.29 17:17:01 - Connecting to Nash (Netherlands, Alblasserdam)

. 2016.10.29 17:17:01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015

. 2016.10.29 17:17:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.10.29 17:17:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.10.29 17:17:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.10.29 17:17:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:17:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:17:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]

. 2016.10.29 17:17:01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.24:443 [nonblock]

. 2016.10.29 17:17:02 - OpenVPN > TCP connection established with [AF_INET]213.152.161.24:443

. 2016.10.29 17:17:02 - OpenVPN > TCPv4_CLIENT link local: [undef]

. 2016.10.29 17:17:02 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.24:443

. 2016.10.29 17:17:03 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.24:443, sid=f302dd79 ca2af1aa

. 2016.10.29 17:17:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.10.29 17:17:03 - OpenVPN > Validating certificate key usage

. 2016.10.29 17:17:03 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.10.29 17:17:03 - OpenVPN > VERIFY KU OK

. 2016.10.29 17:17:03 - OpenVPN > Validating certificate extended key usage

. 2016.10.29 17:17:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.10.29 17:17:03 - OpenVPN > VERIFY EKU OK

. 2016.10.29 17:17:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.10.29 17:17:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:17:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:17:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.10.29 17:17:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.10.29 17:17:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.10.29 17:17:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.24:443

. 2016.10.29 17:17:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2016.10.29 17:17:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.7.31 255.255.0.0'

. 2016.10.29 17:17:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2016.10.29 17:17:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2016.10.29 17:17:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2016.10.29 17:17:07 - OpenVPN > OPTIONS IMPORT: route options modified

. 2016.10.29 17:17:07 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2016.10.29 17:17:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2016.10.29 17:17:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2016.10.29 17:17:07 - OpenVPN > open_tun, tt->ipv6=0

. 2016.10.29 17:17:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D8CDCD02-6D3A-455A-9C20-5FD497606919}.tap

. 2016.10.29 17:17:07 - OpenVPN > TAP-Windows Driver Version 9.21

. 2016.10.29 17:17:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.7.31/255.255.0.0 [sUCCEEDED]

. 2016.10.29 17:17:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.7.31/255.255.0.0 on interface {D8CDCD02-6D3A-455A-9C20-5FD497606919} [DHCP-serv: 10.5.255.254, lease-time: 31536000]

. 2016.10.29 17:17:07 - OpenVPN > Successful ARP Flush on interface [20] {D8CDCD02-6D3A-455A-9C20-5FD497606919}

. 2016.10.29 17:17:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2016.10.29 17:17:12 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.24 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:17:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2016.10.29 17:17:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:17:12 - OpenVPN > C:\Windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 172.17.34.1

. 2016.10.29 17:17:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2016.10.29 17:17:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:17:12 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:17:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2016.10.29 17:17:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:17:12 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2016.10.29 17:17:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2016.10.29 17:17:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2016.10.29 17:17:12 - Starting Management Interface

. 2016.10.29 17:17:12 - OpenVPN > Initialization Sequence Completed

I 2016.10.29 17:17:12 - DNS of a network adapter forced (Intel® Wireless-N 7260)

I 2016.10.29 17:17:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)

I 2016.10.29 17:17:12 - Flushing DNS

I 2016.10.29 17:17:12 - Checking route

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...