masteryoda 0 Posted ... Hi I'm on Win 10 & using the experimental version 2.11. I tried with the stable one too It establishes the connection, but fails to resolve the server. please see log below. Any ideas how to make it work? I 2016.10.30 22:35:09 - Session starting. . 2016.10.30 22:35:09 - IPv6 disabled with packet filtering. I 2016.10.30 22:35:09 - Checking authorization ... ! 2016.10.30 22:35:10 - Connecting to Tejat (Canada, Toronto, Ontario) . 2016.10.30 22:35:10 - OpenVPN > OpenVPN 2.3.12 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Sep 5 2016 . 2016.10.30 22:35:10 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.30 22:35:10 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.30 22:35:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.30 22:35:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.30 22:35:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:35:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:35:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.30 22:35:10 - OpenVPN > UDPv4 link local: [undef] . 2016.10.30 22:35:10 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.194:443 . 2016.10.30 22:35:10 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=2b581512 9ce7f32f . 2016.10.30 22:35:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.30 22:35:10 - OpenVPN > Validating certificate key usage . 2016.10.30 22:35:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.30 22:35:10 - OpenVPN > VERIFY KU OK . 2016.10.30 22:35:10 - OpenVPN > Validating certificate extended key usage . 2016.10.30 22:35:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.30 22:35:10 - OpenVPN > VERIFY EKU OK . 2016.10.30 22:35:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.30 22:35:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.30 22:35:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:35:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.30 22:35:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:35:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.30 22:35:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443 . 2016.10.30 22:35:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.30 22:35:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.108 255.255.0.0' . 2016.10.30 22:35:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.30 22:35:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.30 22:35:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.30 22:35:13 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.30 22:35:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.30 22:35:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.30 22:35:13 - OpenVPN > ROUTE_GATEWAY 192.168.x.1/255.255.255.0 I=5 HWADDR=10:bf:48:7d:ef:f4 . 2016.10.30 22:35:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.30 22:35:13 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.30 22:35:13 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{FE3326A5-43E2-44BD-9312-1DDBAE2828E3}.tap . 2016.10.30 22:35:13 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.10.30 22:35:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.30.108/255.255.0.0 [SUCCEEDED] . 2016.10.30 22:35:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.30.108/255.255.0.0 on interface {FE3326A5-43E2-44BD-9312-1DDBAE2828E3} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.30 22:35:13 - OpenVPN > Successful ARP Flush on interface [17] {FE3326A5-43E2-44BD-9312-1DDBAE2828E3} . 2016.10.30 22:35:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.30 22:35:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.194 MASK 255.255.255.255 192.168.x.1 . 2016.10.30 22:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.10.30 22:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.30 22:35:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.30 22:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.30 22:35:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.30 22:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.30 22:35:18 - Starting Management Interface . 2016.10.30 22:35:18 - OpenVPN > Initialization Sequence Completed . 2016.10.30 22:35:18 - DNS leak protection with packet filtering enabled. . 2016.10.30 22:35:18 - DNS of a network adapter forced (Intel(R) 82579V Gigabit Network Connection, from automatic (192.168.x.1) to 10.4.0.1) I 2016.10.30 22:35:18 - Flushing DNS I 2016.10.30 22:35:21 - Checking route W 2016.10.30 22:35:33 - Checking route, 1° try failed (The operation has timed out) W 2016.10.30 22:35:45 - Checking route, 2° try failed (The operation has timed out) W 2016.10.30 22:35:45 - Checking route, 3° try failed (The remote name could not be resolved: 'tejat_exit.airservers.org') W 2016.10.30 22:35:45 - Checking route, 4° try failed (The remote name could not be resolved: 'tejat_exit.airservers.org') W 2016.10.30 22:35:45 - Checking route, 5° try failed (The remote name could not be resolved: 'tejat_exit.airservers.org') W 2016.10.30 22:35:45 - The remote name could not be resolved: 'tejat_exit.airservers.org' ! 2016.10.30 22:35:45 - Disconnecting . 2016.10.30 22:35:45 - Management - Send 'signal SIGTERM' . 2016.10.30 22:35:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.30 22:35:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.30 22:35:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.30 22:35:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.194 MASK 255.255.255.255 192.168.x.1 . 2016.10.30 22:35:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.30 22:35:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:35:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.30 22:35:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:35:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.30 22:35:50 - OpenVPN > Closing TUN/TAP interface . 2016.10.30 22:35:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.30 22:35:50 - Connection terminated. . 2016.10.30 22:35:50 - DNS of a network adapter restored to original settings (Intel(R) 82579V Gigabit Network Connection, to automatic) . 2016.10.30 22:35:50 - DNS leak protection with packet filtering disabled. I 2016.10.30 22:35:53 - Checking authorization ... ! 2016.10.30 22:35:54 - Connecting to Sualocin (Canada, Toronto, Ontario) . 2016.10.30 22:35:54 - OpenVPN > OpenVPN 2.3.12 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Sep 5 2016 . 2016.10.30 22:35:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.10.30 22:35:54 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.10.30 22:35:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.10.30 22:35:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.10.30 22:35:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:35:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:35:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.10.30 22:35:54 - OpenVPN > UDPv4 link local: [undef] . 2016.10.30 22:35:54 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.42:443 . 2016.10.30 22:35:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.42:443, sid=8f2e571f bfd5f390 . 2016.10.30 22:35:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.10.30 22:35:54 - OpenVPN > Validating certificate key usage . 2016.10.30 22:35:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.10.30 22:35:54 - OpenVPN > VERIFY KU OK . 2016.10.30 22:35:54 - OpenVPN > Validating certificate extended key usage . 2016.10.30 22:35:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.10.30 22:35:54 - OpenVPN > VERIFY EKU OK . 2016.10.30 22:35:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.10.30 22:35:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.30 22:35:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:35:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.10.30 22:35:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.10.30 22:36:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.10.30 22:36:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.42:443 . 2016.10.30 22:36:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.10.30 22:36:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.121 255.255.0.0' . 2016.10.30 22:36:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.10.30 22:36:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.10.30 22:36:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.10.30 22:36:04 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.10.30 22:36:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.10.30 22:36:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.10.30 22:36:04 - OpenVPN > ROUTE_GATEWAY 192.168.x.1/255.255.255.0 I=5 HWADDR=10:bf:48:7d:ef:f4 . 2016.10.30 22:36:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.10.30 22:36:04 - OpenVPN > open_tun, tt->ipv6=0 . 2016.10.30 22:36:04 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{FE3326A5-43E2-44BD-9312-1DDBAE2828E3}.tap . 2016.10.30 22:36:04 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.10.30 22:36:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.121/255.255.0.0 [SUCCEEDED] . 2016.10.30 22:36:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.121/255.255.0.0 on interface {FE3326A5-43E2-44BD-9312-1DDBAE2828E3} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.10.30 22:36:04 - OpenVPN > Successful ARP Flush on interface [17] {FE3326A5-43E2-44BD-9312-1DDBAE2828E3} . 2016.10.30 22:36:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.10.30 22:36:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.42 MASK 255.255.255.255 192.168.x.1 . 2016.10.30 22:36:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2016.10.30 22:36:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.30 22:36:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:36:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.30 22:36:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.30 22:36:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:36:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2016.10.30 22:36:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.10.30 22:36:09 - Starting Management Interface . 2016.10.30 22:36:09 - OpenVPN > Initialization Sequence Completed . 2016.10.30 22:36:09 - DNS leak protection with packet filtering enabled. . 2016.10.30 22:36:09 - DNS of a network adapter forced (Intel(R) 82579V Gigabit Network Connection, from automatic (192.168.x.1) to 10.4.0.1) I 2016.10.30 22:36:09 - Flushing DNS I 2016.10.30 22:36:10 - Checking route W 2016.10.30 22:36:22 - Checking route, 1° try failed (The operation has timed out) W 2016.10.30 22:36:34 - Checking route, 2° try failed (The operation has timed out) W 2016.10.30 22:36:46 - Checking route, 3° try failed (The operation has timed out) W 2016.10.30 22:36:46 - Checking route, 4° try failed (The remote name could not be resolved: 'sualocin_exit.airservers.org') W 2016.10.30 22:36:46 - Checking route, 5° try failed (The remote name could not be resolved: 'sualocin_exit.airservers.org') W 2016.10.30 22:36:46 - The remote name could not be resolved: 'sualocin_exit.airservers.org' ! 2016.10.30 22:36:46 - Disconnecting . 2016.10.30 22:36:46 - Management - Send 'signal SIGTERM' . 2016.10.30 22:36:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.10.30 22:36:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.10.30 22:36:46 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.10.30 22:36:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.42 MASK 255.255.255.255 192.168.x.1 . 2016.10.30 22:36:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.30 22:36:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:36:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.30 22:36:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.10.30 22:36:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.10.30 22:36:51 - OpenVPN > Closing TUN/TAP interface . 2016.10.30 22:36:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.10.30 22:36:51 - Connection terminated. . 2016.10.30 22:36:51 - DNS of a network adapter restored to original settings (Intel(R) 82579V Gigabit Network Connection, to automatic) . 2016.10.30 22:36:51 - DNS leak protection with packet filtering disabled. I 2016.10.30 22:36:51 - Cancel requested. . 2016.10.30 22:36:51 - IPv6 restored with packet filtering. ! 2016.10.30 22:36:52 - Session terminated. Quote Share this post Link to post
go558a83nk 364 Posted ... in Eddie settings you can disable route checking. That should allow you to use the VPN. But, I'd still want to figure out why route checking fails. Quote Share this post Link to post