Jump to content
Not connected, Your IP: 18.119.135.67
Shearp

New UK User - Slow Speeds

Recommended Posts

Hi,

 

With the new laws in the UK passing, I was recommended Airvpn. I'm pretty tech savvy but with VPN's, I have no clue.

 

I should get 100Mbps down and 6Mbps up with Virgin (Superhub 2 wired in). With Airvpn, I vary between 5Mbps and 60Mbps, usually at around 30 or so though.

 

I'm done a lot of research trying to fix my speeds but no luck so far.

 

I have tried:

 

Using experimental version of eddie.

Using older TAP driver.

Increasing buffer size.

Changing the protocols (I've tried most of them, all seems to give similar speeds.

Different servers (mostly Netherlands and Belgium)

 

System:

Windows 10 Pro 64-bit

Intel i5-3570K

ESET NOD32 Antivirus

 

Speed tests:

 

Down: 32.628 Mbit/s Out, 32.229 Mbit/s In (98%), 20MB - Up: 5.476 Mbit/s Out, 5.287 Mbit/s In (96%), 20MB - Date: Thu, 01 Dec 2016 18:32:56 GMT - Buffers: 20MB/20MB - Laps: 3, Time: 114.95 secs

Down: 17.109 Mbit/s Out, 14.645 Mbit/s In (85%), 20MB - Up: 5.537 Mbit/s Out, 5.525 Mbit/s In (99%), 20MB - Date: Thu, 01 Dec 2016 19:36:58 GMT - Buffers: 20MB/20MB - Laps: 3, Time: 128.67 secs

Down: 16.632 Mbit/s Out, 16.704 Mbit/s In (100%), 20MB - Up: 5.418 Mbit/s Out, 5.565 Mbit/s In (102%), 20MB - Date: Thu, 01 Dec 2016 19:42:53 GMT - Buffers: 20MB/20MB - Laps: 3, Time: 126.57 secs

 

Logs

I 2016.12.01 18:20:56 - Eddie client version: 2.11.8 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.10586.0, Mono/.Net Framework: v4.0.30319
. 2016.12.01 18:20:56 - Reading options from C:\Users\Sam\AppData\Local\AirVPN\AirVPN.xml
. 2016.12.01 18:20:56 - Data path: C:\Users\Sam\AppData\Local\AirVPN
. 2016.12.01 18:20:56 - Application path: C:\Program Files\AirVPN
. 2016.12.01 18:20:56 - Executable path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.01 18:20:56 - Command line arguments (1): path="home"
. 2016.12.01 18:20:56 - Operating System: Microsoft Windows NT 10.0.10586.0
I 2016.12.01 18:20:56 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2
I 2016.12.01 18:20:56 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.01 18:20:56 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.01 18:20:56 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.12.01 18:20:57 - Activation of Network Lock - Windows Filtering Platform
I 2016.12.01 18:20:57 - Session starting.
I 2016.12.01 18:20:57 - Retrieving manifest
. 2016.12.01 18:20:57 - Updating systems & servers data ...
. 2016.12.01 18:20:57 - Systems & servers data update completed
. 2016.12.01 18:21:03 - IPv6 disabled with packet filtering.
I 2016.12.01 18:21:03 - Checking authorization ...
! 2016.12.01 18:21:03 - Connecting to Chara (Netherlands, Alblasserdam)
. 2016.12.01 18:21:03 - SSH > Looking up host "109.232.227.132"
. 2016.12.01 18:21:03 - SSH > Connecting to 109.232.227.132 port 22
. 2016.12.01 18:21:03 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67
. 2016.12.01 18:21:03 - SSH > Server version: SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u3
. 2016.12.01 18:21:03 - SSH > Using SSH protocol version 2
. 2016.12.01 18:21:03 - SSH > Doing Diffie-Hellman group exchange
. 2016.12.01 18:21:03 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.12.01 18:21:03 - SSH > Host key fingerprint is:
. 2016.12.01 18:21:03 - SSH > ssh-rsa 2048 ba:3d: :07:87:77:b5:fd:23:cf:8e:e0:1c:f6:50:8b
. 2016.12.01 18:21:03 - SSH > The server's host key is not cached in the registry. You
. 2016.12.01 18:21:03 - SSH > have no guarantee that the server is the computer you
. 2016.12.01 18:21:03 - SSH > think it is.
. 2016.12.01 18:21:03 - SSH > The server's rsa2 key fingerprint is:
. 2016.12.01 18:21:03 - SSH > ssh-rsa 2048 ba:3d: :07:87:77:b5:fd:23:cf:8e:e0:1c:f6:50:8b
. 2016.12.01 18:21:03 - SSH > If you trust this host, enter "y" to add the key to
. 2016.12.01 18:21:03 - SSH > PuTTY's cache and carry on connecting.
. 2016.12.01 18:21:03 - SSH > If you want to carry on connecting just once, without
. 2016.12.01 18:21:03 - SSH > adding the key to the cache, enter "n".
. 2016.12.01 18:21:03 - SSH > If you do not trust this host, press Return to abandon the
. 2016.12.01 18:21:03 - SSH > connection.
. 2016.12.01 18:21:03 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption
. 2016.12.01 18:21:03 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.12.01 18:21:03 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.12.01 18:21:03 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.12.01 18:21:03 - SSH > Reading private key file "C:\Users\Sam\AppData\Local\AirVPN\c04556d06729f30b4f12578e5f12a094cc90b178582c704a4cce37161d4ebc6f.tmp.ppk"
. 2016.12.01 18:21:03 - SSH > Using username "sshtunnel".
. 2016.12.01 18:21:03 - SSH > Offered public key
. 2016.12.01 18:21:03 - SSH > Offer of public key accepted
. 2016.12.01 18:21:03 - SSH > Authenticating with public key ""
. 2016.12.01 18:21:03 - SSH > Sent public key signature
. 2016.12.01 18:21:03 - SSH > Access granted
. 2016.12.01 18:21:03 - SSH > Local port 65029 forwarding to 127.0.0.1:2018
. 2016.12.01 18:21:03 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.01 18:21:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.01 18:21:03 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
. 2016.12.01 18:21:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 18:21:03 - SSH > Remote debug message: Pty allocation disabled.
. 2016.12.01 18:21:03 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.12.01 18:21:03 - SSH > Remote debug message: Forced command.
. 2016.12.01 18:21:03 - SSH > Remote debug message: Pty allocation disabled.
. 2016.12.01 18:21:03 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.12.01 18:21:03 - SSH > Remote debug message: Forced command.
. 2016.12.01 18:21:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 18:21:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:21:03 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:57951
. 2016.12.01 18:21:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:21:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.01 18:21:03 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:65029 [nonblock]
. 2016.12.01 18:21:03 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:65029
. 2016.12.01 18:21:03 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 18:21:03 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:65029
. 2016.12.01 18:21:04 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:65029, sid=6dfd8bb4 98743c8a
. 2016.12.01 18:21:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 18:21:04 - OpenVPN > Validating certificate key usage
. 2016.12.01 18:21:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.12.01 18:21:04 - OpenVPN > VERIFY KU OK
. 2016.12.01 18:21:04 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 18:21:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 18:21:04 - OpenVPN > VERIFY EKU OK
. 2016.12.01 18:21:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 18:21:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 18:21:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:21:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 18:21:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:21:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 18:21:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:65029
. 2016.12.01 18:21:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 18:21:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.8.181 255.255.0.0'
. 2016.12.01 18:21:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 18:21:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 18:21:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 18:21:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 18:21:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 18:21:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 18:21:06 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=bc:5f:f4:36:32:6d
. 2016.12.01 18:21:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 18:21:06 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 18:21:06 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{54F2E0C6-2BB3-4DB3-8357-D240C25E8756}.tap
. 2016.12.01 18:21:06 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.01 18:21:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.8.181/255.255.0.0 [sUCCEEDED]
. 2016.12.01 18:21:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.8.181/255.255.0.0 on interface {54F2E0C6-2BB3-4DB3-8357-D240C25E8756} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.01 18:21:06 - OpenVPN > Successful ARP Flush on interface [8] {54F2E0C6-2BB3-4DB3-8357-D240C25E8756}
. 2016.12.01 18:21:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.01 18:21:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.01 18:21:12 - Eddie Windows Interface Hack executed (Ethernet)
. 2016.12.01 18:21:16 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.12.01 18:21:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.01 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:21:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.01 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:21:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.01 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:21:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.01 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:21:16 - Starting Management Interface
. 2016.12.01 18:21:16 - OpenVPN > Initialization Sequence Completed
. 2016.12.01 18:21:16 - DNS leak protection with packet filtering enabled.
. 2016.12.01 18:21:16 - DNS of a network adapter forced (Broadcom NetLink Gigabit Ethernet, from manual (192.168.0.1) to 10.50.0.1)
. 2016.12.01 18:21:16 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)
I 2016.12.01 18:21:16 - Flushing DNS
I 2016.12.01 18:21:24 - Checking route
I 2016.12.01 18:21:48 - Checking DNS
! 2016.12.01 18:21:49 - Connected.
. 2016.12.01 18:21:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.01 18:21:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.12.01 18:25:16 - Disconnecting
. 2016.12.01 18:25:16 - Management - Send 'signal SIGTERM'
. 2016.12.01 18:25:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 18:25:16 - SSH > Forwarded port closed due to local error: Network error: Software caused connection abort
. 2016.12.01 18:25:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:25:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:25:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:25:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:25:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:25:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:25:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:25:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:25:16 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 18:25:16 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 18:25:16 - Connection terminated.
. 2016.12.01 18:25:16 - DNS of a network adapter restored to original settings (Broadcom NetLink Gigabit Ethernet, to 192.168.0.1)
. 2016.12.01 18:25:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.01 18:25:16 - DNS leak protection with packet filtering disabled.
. 2016.12.01 18:25:16 - IPv6 restored with packet filtering.
! 2016.12.01 18:25:34 - Session terminated.
I 2016.12.01 18:25:55 - Session starting.
. 2016.12.01 18:26:04 - IPv6 disabled with packet filtering.
I 2016.12.01 18:26:04 - Checking authorization ...
! 2016.12.01 18:26:04 - Connecting to Mekbuda (Spain, Madrid)
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[ui]: Reading configuration from file C:\Users\Sam\AppData\Local\AirVPN\9be8bf7282b5614da6f94bb14cb05b8f2f8009d283a87aa37665c9034d4c9552.tmp.ssl
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[ui]: Initializing service [openvpn]
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[ui]: Configuration successful
. 2016.12.01 18:26:04 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.01 18:26:04 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.01 18:26:04 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
. 2016.12.01 18:26:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 18:26:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 18:26:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:26:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:26:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.01 18:26:04 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:24080 [nonblock]
. 2016.12.01 18:26:04 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:24080
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58782
. 2016.12.01 18:26:04 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[0]: s_connect: connecting 185.93.182.172:443
. 2016.12.01 18:26:04 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:24080
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[0]: s_connect: connected 185.93.182.172:443
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:58783
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[0]: SNI: sending servername: 185.93.182.172
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[0]: Peer certificate required
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[0]: Client certificate not requested
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[0]: SSL connected: new session negotiated
. 2016.12.01 18:26:04 - SSL > 2016.12.01 18:26:04 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.01 18:26:04 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:24080, sid=57c46aa8 c4a643e8
. 2016.12.01 18:26:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 18:26:04 - OpenVPN > Validating certificate key usage
. 2016.12.01 18:26:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.12.01 18:26:04 - OpenVPN > VERIFY KU OK
. 2016.12.01 18:26:04 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 18:26:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 18:26:04 - OpenVPN > VERIFY EKU OK
. 2016.12.01 18:26:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 18:26:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 18:26:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:26:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 18:26:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:26:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 18:26:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:24080
. 2016.12.01 18:26:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 18:26:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.134 255.255.0.0'
. 2016.12.01 18:26:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 18:26:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 18:26:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 18:26:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 18:26:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 18:26:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 18:26:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=bc:5f:f4:36:32:6d
. 2016.12.01 18:26:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 18:26:07 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 18:26:07 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{54F2E0C6-2BB3-4DB3-8357-D240C25E8756}.tap
. 2016.12.01 18:26:07 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.01 18:26:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.134/255.255.0.0 [sUCCEEDED]
. 2016.12.01 18:26:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.134/255.255.0.0 on interface {54F2E0C6-2BB3-4DB3-8357-D240C25E8756} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.01 18:26:07 - OpenVPN > Successful ARP Flush on interface [8] {54F2E0C6-2BB3-4DB3-8357-D240C25E8756}
. 2016.12.01 18:26:12 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.12.01 18:26:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:26:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.01 18:26:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:26:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:26:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.01 18:26:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:26:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:26:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.01 18:26:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:26:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 185.93.182.172 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:26:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.01 18:26:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:26:12 - Starting Management Interface
. 2016.12.01 18:26:12 - OpenVPN > Initialization Sequence Completed
. 2016.12.01 18:26:12 - DNS leak protection with packet filtering enabled.
. 2016.12.01 18:26:12 - DNS of a network adapter forced (Broadcom NetLink Gigabit Ethernet, from manual (192.168.0.1) to 10.50.0.1)
. 2016.12.01 18:26:12 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)
I 2016.12.01 18:26:12 - Flushing DNS
I 2016.12.01 18:26:20 - Checking route
I 2016.12.01 18:26:44 - Checking DNS
! 2016.12.01 18:26:45 - Connected.
. 2016.12.01 18:26:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.01 18:26:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 18:27:04 - SSL > 2016.12.01 18:27:04 LOG6[cron]: Executing cron jobs
. 2016.12.01 18:27:04 - SSL > 2016.12.01 18:27:04 LOG6[cron]: Cron jobs completed in 0 seconds
! 2016.12.01 18:28:03 - Disconnecting
. 2016.12.01 18:28:03 - Management - Send 'signal SIGTERM'
. 2016.12.01 18:28:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.01 18:28:03 - SSL > 2016.12.01 18:28:03 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.12.01 18:28:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 185.93.182.172 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:28:03 - SSL > 2016.12.01 18:28:03 LOG5[0]: Connection reset: 2953265 byte(s) sent to SSL, 87517052 byte(s) sent to socket
. 2016.12.01 18:28:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:28:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:28:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:28:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:03 - OpenVPN > Closing TUN/TAP interface
. 2016.12.01 18:28:03 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.12.01 18:28:03 - Connection terminated.
. 2016.12.01 18:28:03 - DNS of a network adapter restored to original settings (Broadcom NetLink Gigabit Ethernet, to 192.168.0.1)
. 2016.12.01 18:28:03 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.01 18:28:03 - DNS leak protection with packet filtering disabled.
. 2016.12.01 18:28:03 - IPv6 restored with packet filtering.
! 2016.12.01 18:28:21 - Session terminated.
I 2016.12.01 18:28:21 - Session starting.
. 2016.12.01 18:28:27 - IPv6 disabled with packet filtering.
I 2016.12.01 18:28:27 - Checking authorization ...
! 2016.12.01 18:28:27 - Connecting to Diadema (Belgium, Brussels)
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[ui]: Reading configuration from file C:\Users\Sam\AppData\Local\AirVPN\fa05058f0b574fd7ea78030274e38f1a68bce39875e70c4e10ad133e8e6b78b2.tmp.ssl
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[ui]: Initializing service [openvpn]
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[ui]: Configuration successful
. 2016.12.01 18:28:27 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.01 18:28:27 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.01 18:28:27 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
. 2016.12.01 18:28:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.01 18:28:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.01 18:28:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:59112
. 2016.12.01 18:28:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:28:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[0]: s_connect: connecting 194.187.251.164:443
. 2016.12.01 18:28:27 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:24189 [nonblock]
. 2016.12.01 18:28:27 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:24189
. 2016.12.01 18:28:27 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.01 18:28:27 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:24189
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[0]: s_connect: connected 194.187.251.164:443
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:59113
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[0]: SNI: sending servername: 194.187.251.164
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[0]: Peer certificate required
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[0]: Client certificate not requested
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[0]: SSL connected: new session negotiated
. 2016.12.01 18:28:27 - SSL > 2016.12.01 18:28:27 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.01 18:28:27 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:24189, sid=234d0ae2 981c81c8
. 2016.12.01 18:28:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 18:28:28 - OpenVPN > Validating certificate key usage
. 2016.12.01 18:28:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.12.01 18:28:28 - OpenVPN > VERIFY KU OK
. 2016.12.01 18:28:28 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 18:28:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 18:28:28 - OpenVPN > VERIFY EKU OK
. 2016.12.01 18:28:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 18:28:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 18:28:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:28:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 18:28:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 18:28:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 18:28:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:24189
. 2016.12.01 18:28:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.01 18:28:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.111 255.255.0.0'
. 2016.12.01 18:28:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.01 18:28:30 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.01 18:28:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.01 18:28:30 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.01 18:28:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.01 18:28:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.01 18:28:30 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=bc:5f:f4:36:32:6d
. 2016.12.01 18:28:30 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.01 18:28:30 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.01 18:28:30 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{54F2E0C6-2BB3-4DB3-8357-D240C25E8756}.tap
. 2016.12.01 18:28:30 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.01 18:28:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.111/255.255.0.0 [sUCCEEDED]
. 2016.12.01 18:28:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.111/255.255.0.0 on interface {54F2E0C6-2BB3-4DB3-8357-D240C25E8756} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.01 18:28:30 - OpenVPN > Successful ARP Flush on interface [8] {54F2E0C6-2BB3-4DB3-8357-D240C25E8756}
. 2016.12.01 18:28:35 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.12.01 18:28:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:28:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.01 18:28:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:28:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.01 18:28:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.01 18:28:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.01 18:28:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 194.187.251.164 MASK 255.255.255.255 192.168.0.1
. 2016.12.01 18:28:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.12.01 18:28:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.01 18:28:35 - Starting Management Interface
. 2016.12.01 18:28:35 - OpenVPN > Initialization Sequence Completed
. 2016.12.01 18:28:35 - DNS leak protection with packet filtering enabled.
. 2016.12.01 18:28:35 - DNS of a network adapter forced (Broadcom NetLink Gigabit Ethernet, from manual (192.168.0.1) to 10.50.0.1)
. 2016.12.01 18:28:35 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)
I 2016.12.01 18:28:35 - Flushing DNS
I 2016.12.01 18:28:43 - Checking route
I 2016.12.01 18:29:07 - Checking DNS
! 2016.12.01 18:29:07 - Connected.
. 2016.12.01 18:29:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.01 18:29:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.01 18:29:27 - SSL > 2016.12.01 18:29:27 LOG6[cron]: Executing cron jobs
. 2016.12.01 18:29:27 - SSL > 2016.12.01 18:29:27 LOG6[cron]: Cron jobs completed in 0 seconds
. 2016.12.01 18:30:59 - Updating systems & servers data ...
. 2016.12.01 18:30:59 - Systems & servers data update completed
. 2016.12.01 18:41:01 - Updating systems & servers data ...
. 2016.12.01 18:41:01 - Systems & servers data update completed
. 2016.12.01 18:51:03 - Updating systems & servers data ...
. 2016.12.01 18:51:03 - Systems & servers data update completed
. 2016.12.01 19:01:05 - Updating systems & servers data ...
. 2016.12.01 19:01:06 - Systems & servers data update completed
. 2016.12.01 19:11:07 - Updating systems & servers data ...
. 2016.12.01 19:11:08 - Systems & servers data update completed
. 2016.12.01 19:21:09 - Updating systems & servers data ...
. 2016.12.01 19:21:10 - Systems & servers data update completed
. 2016.12.01 19:28:28 - OpenVPN > TLS: soft reset sec=0 bytes=260424587/-1 pkts=352239/0
. 2016.12.01 19:28:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.01 19:28:28 - OpenVPN > Validating certificate key usage
. 2016.12.01 19:28:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.12.01 19:28:28 - OpenVPN > VERIFY KU OK
. 2016.12.01 19:28:28 - OpenVPN > Validating certificate extended key usage
. 2016.12.01 19:28:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.01 19:28:28 - OpenVPN > VERIFY EKU OK
. 2016.12.01 19:28:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.01 19:28:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 19:28:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 19:28:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.01 19:28:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.01 19:28:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.01 19:31:11 - Updating systems & servers data ...
. 2016.12.01 19:31:12 - Systems & servers data update completed
. 2016.12.01 19:41:13 - Updating systems & servers data ...
. 2016.12.01 19:41:14 - Systems & servers data update completed

Share this post


Link to post

Hello!

 

Welcome to AirVPN! It's great you've decided to do something for your privacy (send your referral link to friends, as you'll get 20% off of whatever they pay when they sub, for use in your own sub).

 

Maybe this link will help you troubleshoot the speed - since the Air test isn't the most reliable necessarily .

 

There's also an introduction to VPNs in my signature.

 

Couldn't hurt to consider upgrading your router either


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Thanks for the reply. I've used other speed tests plus tested with downloading torrents as well. It's definitely the speed I'm getting.

 

I'm not convinced it's the router causing my 15-30% speeds

Share this post


Link to post

You are using SSH tunnel, a speed decrease is expected in this connection method.

Don't use it unless you are throttled on VPN traffic, it has nothing to add to your privacy and should be used only when necessary.

 

Also, your out of tunnel speeds measured 32,17,16, and in-tunnel speed varied from 85% to 100% of the out one.

Try experimenting with nearer servers, this does not look like any other problem except from your ISP.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

I am also with Virgin Media on their 200GB service. I am also a long standing AirVPN user going back to when I only had the Virgin 50GB service. All that time I have found that I get approximately 50-60% of the download speed and 85-100% of the upload speed while using AirVPN servers so your speeds are par for the course in my opinion. I have tried different protocols and find that UDP port 443 generally gives the best speeds. I use Speedtest to test my broadband. On the other hand I have noticed no difference in speed when downloading whether on or off AirVPN, on a good server and all being well I generally get around 15-20Mibs download speed spread out over a max of 5 active downloads depending on available seeds when I use qBittorrent.

Share this post


Link to post

Thank you Zhang888, I'm a fool, I assumed I was being throttled due to other threads about Virgin media so I was only trying other protocols. Changed to UDP 443 and getting ~90 Mbit/s!!!

​Thank you all so much!!

Share this post


Link to post

I assumed you had tried UDP already lol. Anyhow, good for you. Enjoy!


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...