Wolverine7 0 Posted ... I keep getting "the remote name could not be resolved". I just paid for a 3 day trial and have not connected to 1 server after trying for 45+ minutes... here is my log, I don't know where else to go from here. My Tap adapter has a red 'X' next to it when Air vpn times out, then goes back to normal I 2016.11.03 23:22:17 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.11.03 23:22:17 - Reading options from C:\Users\Liam\AppData\Local\AirVPN\AirVPN.xml. 2016.11.03 23:22:17 - Data Path: C:\Users\Liam\AppData\Local\AirVPN. 2016.11.03 23:22:17 - App Path: C:\Program Files\AirVPN. 2016.11.03 23:22:17 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.11.03 23:22:17 - Command line arguments (1): path="home". 2016.11.03 23:22:17 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.11.03 23:22:17 - Updating systems & servers data ...I 2016.11.03 23:22:17 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.11.03 23:22:17 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.11.03 23:22:17 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.11.03 23:22:17 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.11.03 23:22:17 - Ready. 2016.11.03 23:22:18 - Systems & servers data update completedI 2016.11.03 23:22:19 - Session starting.F 2016.11.03 23:22:19 - OpenVPN is already running.I 2016.11.03 23:22:50 - Session starting.I 2016.11.03 23:22:50 - IPv6 disabled.I 2016.11.03 23:22:51 - Checking authorization ...! 2016.11.03 23:22:51 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:22:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:22:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:22:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:22:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:22:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:22:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:22:51 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:22:51 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:22:51 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:22:51 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=4cb1c3bc 963547c8. 2016.11.03 23:22:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:22:51 - OpenVPN > Validating certificate key usage. 2016.11.03 23:22:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:22:51 - OpenVPN > VERIFY KU OK. 2016.11.03 23:22:51 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:22:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:22:51 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:22:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:22:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:22:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:22:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:22:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:22:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:22:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:22:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:22:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:22:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:22:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:22:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:22:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:22:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:22:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:22:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:22:55 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:22:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:22:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:22:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:22:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:22:55 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:23:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:23:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:23:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:23:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:23:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:23:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=18]. 2016.11.03 23:23:00 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.03 23:23:00 - OpenVPN > Route addition fallback to route.exe. 2016.11.03 23:23:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.11.03 23:23:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:23:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=8]. 2016.11.03 23:23:00 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.03 23:23:00 - OpenVPN > Route addition fallback to route.exe. 2016.11.03 23:23:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.11.03 23:23:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:23:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=8]. 2016.11.03 23:23:00 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.03 23:23:00 - OpenVPN > Route addition fallback to route.exe. 2016.11.03 23:23:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.11.03 23:23:00 - Starting Management Interface. 2016.11.03 23:23:00 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:23:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:23:00 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:23:00 - Flushing DNSI 2016.11.03 23:23:00 - Checking routeW 2016.11.03 23:23:24 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:23:24 - Disconnecting. 2016.11.03 23:23:24 - Management - Send 'signal SIGTERM'. 2016.11.03 23:23:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:23:24 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:23:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:23:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:23:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:23:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:23:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:23:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:23:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:23:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:23:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:23:29 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:23:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:23:29 - Connection terminated.I 2016.11.03 23:23:29 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:23:29 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)E 2016.11.03 23:23:32 - Unknown commandI 2016.11.03 23:23:33 - Checking authorization ...! 2016.11.03 23:23:33 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:23:33 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:23:33 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:23:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:23:33 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:23:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:23:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:23:33 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:23:33 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:23:33 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:23:33 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=52e34986 abff91e5. 2016.11.03 23:23:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:23:36 - OpenVPN > Validating certificate key usage. 2016.11.03 23:23:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:23:36 - OpenVPN > VERIFY KU OK. 2016.11.03 23:23:36 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:23:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:23:36 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:23:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:23:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:23:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:23:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:23:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:23:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:23:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:23:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:23:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:23:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:23:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:23:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:23:41 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:23:41 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:23:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:23:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:23:41 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:23:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:23:41 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:23:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:23:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:23:41 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:23:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:23:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:23:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:23:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:23:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:23:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:23:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:23:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:23:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:23:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:23:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:23:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:23:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:23:46 - Starting Management Interface. 2016.11.03 23:23:46 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:23:46 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:23:46 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:23:46 - Flushing DNSI 2016.11.03 23:23:47 - Checking routeW 2016.11.03 23:24:11 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:24:11 - Disconnecting. 2016.11.03 23:24:11 - Management - Send 'signal SIGTERM'. 2016.11.03 23:24:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:24:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:24:11 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:24:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:24:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:24:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:16 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:24:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:24:16 - Connection terminated.I 2016.11.03 23:24:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:24:16 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:24:19 - Checking authorization ...! 2016.11.03 23:24:20 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:24:20 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:24:20 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:24:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:24:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:24:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:20 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:24:20 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:24:20 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:24:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=c25c082a fa5c93fc. 2016.11.03 23:24:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:24:20 - OpenVPN > Validating certificate key usage. 2016.11.03 23:24:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:24:20 - OpenVPN > VERIFY KU OK. 2016.11.03 23:24:20 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:24:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:24:20 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:24:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:24:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:24:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:24:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:24:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:24:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:24:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:24:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:24:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:24:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:24:22 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:24:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:24:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:24:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:24:22 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:24:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:24:22 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:24:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:24:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:24:22 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:24:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:24:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:24:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:24:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:24:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:24:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:24:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:24:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:27 - Starting Management Interface. 2016.11.03 23:24:27 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:24:27 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:24:27 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:24:27 - Flushing DNSI 2016.11.03 23:24:27 - Checking routeW 2016.11.03 23:24:39 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:24:39 - Disconnecting. 2016.11.03 23:24:39 - Management - Send 'signal SIGTERM'. 2016.11.03 23:24:39 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:24:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:24:39 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:24:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:24:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:24:44 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:24:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:24:44 - Connection terminated.I 2016.11.03 23:24:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:24:44 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:24:47 - Checking authorization ...! 2016.11.03 23:24:47 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:24:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:24:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:24:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:47 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:24:47 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:24:47 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=818b4644 062bab0c. 2016.11.03 23:24:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:24:47 - OpenVPN > Validating certificate key usage. 2016.11.03 23:24:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:24:47 - OpenVPN > VERIFY KU OK. 2016.11.03 23:24:47 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:24:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:24:47 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:24:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:24:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:24:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:24:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:24:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:24:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:24:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:24:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:24:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:24:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:24:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:24:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:24:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:24:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:24:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:24:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:24:50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:24:50 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:24:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:24:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:24:50 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:24:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:24:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:24:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:24:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:24:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:24:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:24:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:24:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:24:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:24:55 - Starting Management Interface. 2016.11.03 23:24:55 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:24:55 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:24:55 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:24:55 - Flushing DNSI 2016.11.03 23:24:55 - Checking routeW 2016.11.03 23:25:07 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:25:07 - Disconnecting. 2016.11.03 23:25:07 - Management - Send 'signal SIGTERM'. 2016.11.03 23:25:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:25:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:25:07 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:25:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:25:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:25:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:25:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:25:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:12 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:25:12 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:25:12 - Connection terminated.I 2016.11.03 23:25:12 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:25:12 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:25:15 - Checking authorization ...! 2016.11.03 23:25:15 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:25:15 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:25:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:25:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:25:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:25:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:25:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:25:15 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:25:15 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:25:15 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:25:15 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=f5158855 1f182493. 2016.11.03 23:25:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:25:16 - OpenVPN > Validating certificate key usage. 2016.11.03 23:25:16 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:25:16 - OpenVPN > VERIFY KU OK. 2016.11.03 23:25:16 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:25:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:25:16 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:25:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:25:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:25:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:25:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:25:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:25:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:25:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:25:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:25:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:25:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:25:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:25:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:25:22 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:25:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:25:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:25:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:25:22 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:25:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:25:22 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:25:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:25:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:25:22 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:25:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:25:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:25:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:25:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:25:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:25:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:25:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:25:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:25:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:25:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:25:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:25:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:25:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:25:27 - Starting Management Interface. 2016.11.03 23:25:27 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:25:27 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:25:27 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:25:27 - Flushing DNSI 2016.11.03 23:25:27 - Checking routeW 2016.11.03 23:25:51 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:25:51 - Disconnecting. 2016.11.03 23:25:51 - Management - Send 'signal SIGTERM'. 2016.11.03 23:25:51 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:25:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:25:51 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:25:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:25:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:25:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:25:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:56 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:25:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:25:56 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:25:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:25:56 - Connection terminated.I 2016.11.03 23:25:56 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:25:56 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:25:59 - Checking authorization ...! 2016.11.03 23:25:59 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:25:59 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:25:59 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:25:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:26:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:26:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:00 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:26:00 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:26:00 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:26:00 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=e4d164ea 516fc449. 2016.11.03 23:26:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:26:00 - OpenVPN > Validating certificate key usage. 2016.11.03 23:26:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:26:00 - OpenVPN > VERIFY KU OK. 2016.11.03 23:26:00 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:26:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:26:00 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:26:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:26:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:26:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:26:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:26:00 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:26:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:26:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:26:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:26:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:26:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:26:02 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:26:02 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:26:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:26:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:26:02 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:26:02 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:26:02 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:26:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:26:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:26:02 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:26:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:26:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:26:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:26:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:26:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:26:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:26:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:26:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:07 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:26:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:26:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:07 - Starting Management Interface. 2016.11.03 23:26:07 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:26:07 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:26:07 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:26:07 - Flushing DNSI 2016.11.03 23:26:07 - Checking routeW 2016.11.03 23:26:19 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:26:19 - Disconnecting. 2016.11.03 23:26:19 - Management - Send 'signal SIGTERM'. 2016.11.03 23:26:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:26:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:26:19 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:26:24 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:26:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:26:24 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:26:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:26:24 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:26:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:26:24 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:26:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:26:24 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:26:24 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:26:24 - Connection terminated.I 2016.11.03 23:26:24 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:26:24 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:26:27 - Checking authorization ...! 2016.11.03 23:26:28 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:26:28 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:26:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:26:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:26:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:26:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:28 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:26:28 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:26:28 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:26:28 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=fad8c385 c201983e. 2016.11.03 23:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:26:31 - OpenVPN > Validating certificate key usage. 2016.11.03 23:26:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:26:31 - OpenVPN > VERIFY KU OK. 2016.11.03 23:26:31 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:26:31 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:26:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:26:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:26:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:26:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:26:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:26:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:26:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:26:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:26:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:26:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:26:38 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:26:38 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:26:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:26:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:26:38 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:26:38 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:26:38 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:26:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:26:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:26:38 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:26:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:26:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:26:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:26:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:26:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:26:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:26:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:26:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:26:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:26:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:26:43 - Starting Management Interface. 2016.11.03 23:26:43 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:26:43 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:26:43 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:26:43 - Flushing DNSI 2016.11.03 23:26:43 - Checking routeW 2016.11.03 23:27:07 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:27:07 - Disconnecting. 2016.11.03 23:27:07 - Management - Send 'signal SIGTERM'. 2016.11.03 23:27:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:27:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:27:07 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:27:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:27:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:27:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:27:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:12 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:27:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:12 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:27:12 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:27:12 - Connection terminated.I 2016.11.03 23:27:12 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:27:12 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:27:15 - Checking authorization ...! 2016.11.03 23:27:15 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:27:15 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:27:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:27:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:27:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:27:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:27:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:27:15 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:27:15 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:27:15 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:27:15 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=1c51d2ec e51921d4. 2016.11.03 23:27:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:27:15 - OpenVPN > Validating certificate key usage. 2016.11.03 23:27:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:27:15 - OpenVPN > VERIFY KU OK. 2016.11.03 23:27:15 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:27:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:27:15 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:27:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:27:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:27:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:27:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:27:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:27:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:27:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:27:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:27:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:27:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:27:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:27:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:27:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:27:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:27:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:27:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:27:20 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:27:20 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:27:20 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:27:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:27:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:27:20 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:27:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:27:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:27:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:27:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:27:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:27:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:27:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:27:25 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:27:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:27:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:27:25 - Starting Management Interface. 2016.11.03 23:27:25 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:27:25 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:27:25 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:27:25 - Flushing DNSI 2016.11.03 23:27:26 - Checking routeW 2016.11.03 23:27:50 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:27:50 - Disconnecting. 2016.11.03 23:27:50 - Management - Send 'signal SIGTERM'. 2016.11.03 23:27:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:27:50 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:27:50 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:27:55 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:27:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:55 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:27:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:55 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:27:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:55 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:27:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:27:55 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:27:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:27:55 - Connection terminated.I 2016.11.03 23:27:55 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:27:55 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:27:58 - Checking authorization ...! 2016.11.03 23:27:59 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:27:59 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:27:59 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:27:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:27:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:27:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:27:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:27:59 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:27:59 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:27:59 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:28:00 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=ae559e42 79cd54c1. 2016.11.03 23:28:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:28:03 - OpenVPN > Validating certificate key usage. 2016.11.03 23:28:03 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:28:03 - OpenVPN > VERIFY KU OK. 2016.11.03 23:28:03 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:28:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:28:03 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:28:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:28:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:28:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:28:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:28:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:28:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:28:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:28:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:28:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:28:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:28:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:28:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:28:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:28:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:28:07 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:28:08 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:28:08 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:28:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:28:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:28:08 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:28:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.03 23:28:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:28:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:28:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:28:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 18. 2016.11.03 23:28:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.03 23:28:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:28:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:28:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:28:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:28:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:28:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.03 23:28:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.03 23:28:13 - Starting Management Interface. 2016.11.03 23:28:13 - OpenVPN > Initialization Sequence CompletedI 2016.11.03 23:28:13 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.03 23:28:13 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:28:13 - Flushing DNSI 2016.11.03 23:28:13 - Checking routeW 2016.11.03 23:28:37 - The remote name could not be resolved: 'avior_exit.airservers.org'! 2016.11.03 23:28:37 - Disconnecting. 2016.11.03 23:28:37 - Management - Send 'signal SIGTERM'. 2016.11.03 23:28:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.03 23:28:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.03 23:28:37 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.03 23:28:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.223.234 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:28:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:28:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1. 2016.11.03 23:28:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:28:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:28:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:28:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.03 23:28:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.03 23:28:42 - OpenVPN > Closing TUN/TAP interface. 2016.11.03 23:28:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.03 23:28:42 - Connection terminated.I 2016.11.03 23:28:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.11.03 23:28:42 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I218-V)I 2016.11.03 23:28:45 - Checking authorization ...! 2016.11.03 23:28:46 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:28:46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:28:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:28:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:28:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:28:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:46 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:28:46 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:28:46 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:28:46 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=796e89e0 bfd8609c. 2016.11.03 23:28:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:28:46 - OpenVPN > Validating certificate key usage. 2016.11.03 23:28:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:28:46 - OpenVPN > VERIFY KU OK. 2016.11.03 23:28:46 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:28:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:28:46 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:28:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:28:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:28:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:28:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:28:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:28:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:28:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:28:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:28:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:28:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:28:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:28:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:28:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:28:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:28:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:28:50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:28:50 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.03 23:28:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.225/255.255.0.0 [sUCCEEDED]. 2016.11.03 23:28:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.225/255.255.0.0 on interface {8A120592-FC45-4CCB-B86E-70C849C87B04} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.03 23:28:50 - OpenVPN > Successful ARP Flush on interface [8] {8A120592-FC45-4CCB-B86E-70C849C87B04}. 2016.11.03 23:28:53 - OpenVPN > TUN/TAP I/O operation aborted, exiting. 2016.11.03 23:28:53 - OpenVPN > Exiting due to fatal error. 2016.11.03 23:28:53 - OpenVPN > Closing TUN/TAP interface! 2016.11.03 23:28:53 - Disconnecting. 2016.11.03 23:28:53 - Connection terminated.I 2016.11.03 23:28:56 - Checking authorization ...! 2016.11.03 23:28:57 - Connecting to Avior (Canada, Toronto, Ontario). 2016.11.03 23:28:57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.03 23:28:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.03 23:28:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.03 23:28:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.03 23:28:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:57 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.11.03 23:28:57 - OpenVPN > UDPv4 link local: [undef]. 2016.11.03 23:28:57 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.234:443. 2016.11.03 23:28:57 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=d34b5a02 292f630d. 2016.11.03 23:28:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.03 23:28:57 - OpenVPN > Validating certificate key usage. 2016.11.03 23:28:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.03 23:28:57 - OpenVPN > VERIFY KU OK. 2016.11.03 23:28:57 - OpenVPN > Validating certificate extended key usage. 2016.11.03 23:28:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.03 23:28:57 - OpenVPN > VERIFY EKU OK. 2016.11.03 23:28:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.03 23:28:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:28:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.03 23:28:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.03 23:28:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.03 23:28:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443. 2016.11.03 23:28:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.03 23:28:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.225 255.255.0.0'. 2016.11.03 23:28:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.03 23:28:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.03 23:28:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.03 23:28:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.03 23:28:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.03 23:28:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.03 23:28:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.03 23:28:59 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.03 23:28:59 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{8A120592-FC45-4CCB-B86E-70C849C87B04}.tap. 2016.11.03 23:28:59 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2016.11.03 23:28:59 - OpenVPN > Exiting due to fatal error! 2016.11.03 23:28:59 - Disconnecting. 2016.11.03 23:28:59 - Connection terminated. Quote Share this post Link to post
LZ1 673 Posted ... Hello! Welcome to AirVPN ! You can try: Turning off IPv6 in your system. Upgrading to the experimental/beta Eddie client. Trying different servers and/or protocols. Restarting the TAP driver: Control Panel>Network & Internet>Network Connections>Disable and then re-enable the TAP driver. Sometimes works. Then make sure no firewall/anti-virus software might be blocking AirVPN.exe or OpenVPN.exe. The Beta Client handles such 3rd party security software better. For instruction, my signature is at your service. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
ConcreteIsland 0 Posted ... Thank you, disabling and enabling again worked! Quote Share this post Link to post