ometec 1 Posted ... Dear members, I am having frequent disconnections while using the SSL or SSH layered connections. Since i am based at UAE i prefer to use these layers protocols rather than other alternatives, but on average every 30-45 mins i am disconnecting from the service. I am using the beta latest version as eddie client and i am facing this issue across several different servers. Attached you may find the log file for your review. I am using Windows 10 as operating system. Looking forward to have a solution to this problem.... Thanks...Eddie_20161203_163919.txt Quote Share this post Link to post
LZ1 672 Posted ... Hello! Please download the latest Beta client . But don't use Network Lock in conjunction with the routes feature, as there's a bug currently. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
Khariz 109 Posted ... In case you are wondering why LZ1 responded the way he did, you claimed you are using the latest Beta, but your logs say "Eddie client version: 2.11.5". The most current beta version is 2.11.8 1 LZ1 reacted to this Quote Share this post Link to post
ometec 1 Posted ... Thanks gents, i have updated my client to latest 2.11.8 version...question : if i disable network lock, i may face a dns leak issue.. .still would you recommend to keep network lock off? thanks Quote Share this post Link to post
zhang888 1066 Posted ... Thanks gents, i have updated my client to latest 2.11.8 version...question : if i disable network lock, i may face a dns leak issue.. .still would you recommend to keep network lock off? thanks The network lock may only cause issues in conjunction with custom routes. If you are not using any custom routes it works perfectlyso there is no reason to disable it. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
greenclaydog 6 Posted ... Dear members, I am having frequent disconnections while using the SSL or SSH layered connections. Since i am based at UAE i prefer to use these layers protocols rather than other alternatives, but on average every 30-45 mins i am disconnecting from the service. I am using the beta latest version as eddie client and i am facing this issue across several different servers. Attached you may find the log file for your review. I am using Windows 10 as operating system. Looking forward to have a solution to this problem.... Thanks... As LZ1 said, update Eddie. You are on the 2.11.5 beta, Air has since released 2.11.8 beta. You may find it on the download page and click other versions and experimental same as you did before. Let us know if it makes any difference for you. Quote Share this post Link to post
ometec 1 Posted ... I have updated client version to the latest 2.11.8... in addition there is no use of functions in routes feature... unfortunately still disconnections are happening... below you may see the logs, i have copied in the message...help please, thanks.... I 2016.12.04 08:01:52 - Eddie client version: 2.11.8 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319. 2016.12.04 08:01:52 - Reading options from C:\Users\Emre\AppData\Local\AirVPN\AirVPN.xml. 2016.12.04 08:01:53 - Data path: C:\Users\Emre\AppData\Local\AirVPN. 2016.12.04 08:01:53 - Application path: C:\Program Files\AirVPN. 2016.12.04 08:01:53 - Executable path: C:\Program Files\AirVPN\AirVPN.exe. 2016.12.04 08:01:53 - Command line arguments (1): path="home". 2016.12.04 08:01:53 - Operating System: Microsoft Windows NT 10.0.14393.0I 2016.12.04 08:01:57 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2016.12.04 08:01:57 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)I 2016.12.04 08:01:57 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2016.12.04 08:01:57 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)! 2016.12.04 08:01:57 - Activation of Network Lock - Windows Filtering Platform! 2016.12.04 08:01:57 - Ready. 2016.12.04 08:01:57 - Updating systems & servers data ...I 2016.12.04 08:02:02 - Session starting.. 2016.12.04 08:02:10 - IPv6 disabled with packet filtering.I 2016.12.04 08:02:10 - Checking authorization .... 2016.12.04 08:02:23 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (The operation has timed out)! 2016.12.04 08:02:24 - Connecting to Chara (Netherlands, Alblasserdam). 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\67a035fc515279c7a3605c09dbf40fdd8fb56455dd038e50827733dd5f53cb12.tmp.ssl. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: UTF-8 byte order mark not detected. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG6[ui]: Initializing service [openvpn]. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Configuration successful. 2016.12.04 08:02:24 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.12.04 08:02:24 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.12.04 08:02:24 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.12.04 08:02:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.12.04 08:02:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.04 08:02:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.12.04 08:02:25 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:34426 [nonblock]. 2016.12.04 08:02:25 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:34426. 2016.12.04 08:02:25 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.12.04 08:02:25 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:34426. 2016.12.04 08:02:25 - SSL > 2016.12.04 08:02:25 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:4269. 2016.12.04 08:02:25 - SSL > 2016.12.04 08:02:25 LOG6[0]: s_connect: connecting 109.232.227.134:443. 2016.12.04 08:02:35 - SSL > 2016.12.04 08:02:35 LOG3[0]: s_connect: s_poll_wait 109.232.227.134:443: TIMEOUTconnect exceeded. 2016.12.04 08:02:35 - SSL > 2016.12.04 08:02:35 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket. 2016.12.04 08:02:35 - OpenVPN > Connection reset, restarting [-1]. 2016.12.04 08:02:35 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.12.04 08:02:35 - OpenVPN > Restart pause, 5 second(s)! 2016.12.04 08:02:35 - Disconnecting. 2016.12.04 08:02:35 - Connection terminated.I 2016.12.04 08:02:38 - Checking authorization ...! 2016.12.04 08:02:39 - Connecting to Anser (Netherlands, Alblasserdam). 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\cc04d441def7d34fc8b4e1af647b32b3c6aa0e43ea66578cb9b199188b03fdba.tmp.ssl. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: UTF-8 byte order mark not detected. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG6[ui]: Initializing service [openvpn]. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Configuration successful. 2016.12.04 08:02:39 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.12.04 08:02:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.12.04 08:02:39 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.12.04 08:02:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.12.04 08:02:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.04 08:02:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.12.04 08:02:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:19666 [nonblock]. 2016.12.04 08:02:39 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:19666. 2016.12.04 08:02:39 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.12.04 08:02:39 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:19666. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:4276. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG6[0]: s_connect: connecting 109.202.103.171:443. 2016.12.04 08:02:49 - SSL > 2016.12.04 08:02:49 LOG3[0]: s_connect: s_poll_wait 109.202.103.171:443: TIMEOUTconnect exceeded. 2016.12.04 08:02:49 - SSL > 2016.12.04 08:02:49 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket. 2016.12.04 08:02:49 - OpenVPN > Connection reset, restarting [-1]. 2016.12.04 08:02:49 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.12.04 08:02:49 - OpenVPN > Restart pause, 5 second(s)! 2016.12.04 08:02:49 - Disconnecting. 2016.12.04 08:02:49 - Connection terminated.I 2016.12.04 08:02:52 - Checking authorization ...! 2016.12.04 08:02:53 - Connecting to Zibal (Netherlands, Alblasserdam). 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\7afa53570127c1399f3ccb5290659a8b3c55809898495a89a1f587b4740b329e.tmp.ssl. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: UTF-8 byte order mark not detected. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[ui]: Initializing service [openvpn]. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Configuration successful. 2016.12.04 08:02:53 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.12.04 08:02:53 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.12.04 08:02:53 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.12.04 08:02:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.12.04 08:02:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.04 08:02:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.12.04 08:02:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:37169 [nonblock]. 2016.12.04 08:02:53 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:37169. 2016.12.04 08:02:53 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.12.04 08:02:53 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:37169. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:4285. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: s_connect: connecting 213.152.161.150:443. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: s_connect: connected 213.152.161.150:443. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.113:4286. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: SNI: sending servername: 213.152.161.150. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: Peer certificate required. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: CERT: Locally installed certificate matched. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: Client certificate not requested. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: SSL connected: new session negotiated. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.12.04 08:02:54 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:37169, sid=c3e29bf6 c546ee8b. 2016.12.04 08:02:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.04 08:02:54 - OpenVPN > Validating certificate key usage. 2016.12.04 08:02:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.04 08:02:54 - OpenVPN > VERIFY KU OK. 2016.12.04 08:02:54 - OpenVPN > Validating certificate extended key usage. 2016.12.04 08:02:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.04 08:02:54 - OpenVPN > VERIFY EKU OK. 2016.12.04 08:02:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.04 08:02:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.04 08:02:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.04 08:02:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:02:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.04 08:02:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:37169. 2016.12.04 08:02:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.04 08:02:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.6.196 255.255.0.0'. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.04 08:02:57 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=c0:38:96:6c:00:0d. 2016.12.04 08:02:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.04 08:02:57 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.04 08:02:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DAAE7FB6-A999-49B8-9A17-85038F667F47}.tap. 2016.12.04 08:02:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.04 08:02:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.6.196/255.255.0.0 [sUCCEEDED]. 2016.12.04 08:02:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.6.196/255.255.0.0 on interface {DAAE7FB6-A999-49B8-9A17-85038F667F47} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.12.04 08:02:57 - OpenVPN > Successful ARP Flush on interface [19] {DAAE7FB6-A999-49B8-9A17-85038F667F47}. 2016.12.04 08:03:02 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.150 MASK 255.255.255.255 192.168.0.1. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.04 08:03:02 - Starting Management Interface. 2016.12.04 08:03:02 - OpenVPN > Initialization Sequence Completed. 2016.12.04 08:03:02 - DNS leak protection with packet filtering enabled.. 2016.12.04 08:03:02 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, from automatic (192.168.0.1) to 10.50.0.1)I 2016.12.04 08:03:02 - Flushing DNSI 2016.12.04 08:03:08 - Checking routeI 2016.12.04 08:03:09 - Checking DNS! 2016.12.04 08:03:22 - Connected.. 2016.12.04 08:03:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2016.12.04 08:03:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.04 08:03:53 - SSL > 2016.12.04 08:03:53 LOG6[cron]: Executing cron jobs. 2016.12.04 08:03:53 - SSL > 2016.12.04 08:03:53 LOG6[cron]: Cron jobs completed in 0 seconds. 2016.12.04 08:07:04 - SSL > 2016.12.04 08:07:04 LOG6[0]: SSL closed (SSL_read). 2016.12.04 08:07:04 - OpenVPN > Connection reset, restarting [0]. 2016.12.04 08:07:04 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.12.04 08:07:04 - OpenVPN > Restart pause, 5 second(s)! 2016.12.04 08:07:04 - Disconnecting. 2016.12.04 08:07:04 - Management - Send 'signal SIGTERM'. 2016.12.04 08:07:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.04 08:07:04 - OpenVPN > MANAGEMENT: Client disconnected. 2016.12.04 08:07:04 - OpenVPN > Assertion failed at misc.c:785 (es). 2016.12.04 08:07:04 - OpenVPN > Exiting due to fatal error. 2016.12.04 08:07:04 - Connection terminated.. 2016.12.04 08:07:04 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, to automatic). 2016.12.04 08:07:05 - DNS leak protection with packet filtering disabled.I 2016.12.04 08:07:08 - Checking authorization ...W 2016.12.04 08:07:33 - Authorization check failed, continue anyway ({1]). 2016.12.04 08:07:33 - IPv6 restored with packet filtering.! 2016.12.04 08:07:41 - Session terminated.I 2016.12.04 08:07:41 - Session starting.. 2016.12.04 08:07:49 - IPv6 disabled with packet filtering.I 2016.12.04 08:07:49 - Checking authorization ...! 2016.12.04 08:07:50 - Connecting to Elnath (Netherlands, Alblasserdam). 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\afdb277f39e43db9021ca628d2fda1624b4159cb27599c435520a019d5b85db4.tmp.ssl. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: UTF-8 byte order mark not detected. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG6[ui]: Initializing service [openvpn]. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Configuration successful. 2016.12.04 08:07:50 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.12.04 08:07:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.12.04 08:07:50 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.12.04 08:07:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.12.04 08:07:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.04 08:07:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:07:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:6290. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG6[0]: s_connect: connecting 213.152.180.6:443. 2016.12.04 08:07:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.12.04 08:07:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:7400 [nonblock]. 2016.12.04 08:07:50 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:7400. 2016.12.04 08:07:50 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.12.04 08:07:50 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:7400. 2016.12.04 08:08:00 - SSL > 2016.12.04 08:08:00 LOG3[0]: s_connect: s_poll_wait 213.152.180.6:443: TIMEOUTconnect exceeded. 2016.12.04 08:08:00 - SSL > 2016.12.04 08:08:00 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket. 2016.12.04 08:08:00 - OpenVPN > Connection reset, restarting [-1]. 2016.12.04 08:08:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.12.04 08:08:00 - OpenVPN > Restart pause, 5 second(s)! 2016.12.04 08:08:00 - Disconnecting. 2016.12.04 08:08:00 - Connection terminated.I 2016.12.04 08:08:03 - Checking authorization ...! 2016.12.04 08:08:04 - Connecting to Alzirr (Netherlands, Alblasserdam). 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\88cb1044887569f4a97a17ae9d6b9ed99906e08a2e025d9fd07246b95ab6fb7b.tmp.ssl. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: UTF-8 byte order mark not detected. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG6[ui]: Initializing service [openvpn]. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Configuration successful. 2016.12.04 08:08:04 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.12.04 08:08:04 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.12.04 08:08:04 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.12.04 08:08:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.12.04 08:08:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:6296. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG6[0]: s_connect: connecting 109.202.107.16:443. 2016.12.04 08:08:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:08:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:08:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.12.04 08:08:04 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:55317 [nonblock]. 2016.12.04 08:08:04 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:55317. 2016.12.04 08:08:04 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.12.04 08:08:04 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55317. 2016.12.04 08:08:14 - SSL > 2016.12.04 08:08:14 LOG3[0]: s_connect: s_poll_wait 109.202.107.16:443: TIMEOUTconnect exceeded. 2016.12.04 08:08:14 - SSL > 2016.12.04 08:08:14 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket. 2016.12.04 08:08:14 - OpenVPN > Connection reset, restarting [-1]. 2016.12.04 08:08:14 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.12.04 08:08:14 - OpenVPN > Restart pause, 5 second(s)! 2016.12.04 08:08:14 - Disconnecting. 2016.12.04 08:08:14 - Connection terminated.I 2016.12.04 08:08:17 - Checking authorization ...! 2016.12.04 08:08:17 - Connecting to Jabbah (Netherlands, Alblasserdam). 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\abda6ac434f6427e36ba24cf4ae9e2104e0703d67d5990868c63f09ac79a04c7.tmp.ssl. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: UTF-8 byte order mark not detected. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[ui]: Initializing service [openvpn]. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Configuration successful. 2016.12.04 08:08:18 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.12.04 08:08:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.12.04 08:08:18 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.12.04 08:08:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.12.04 08:08:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.12.04 08:08:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:08:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:6302. 2016.12.04 08:08:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: s_connect: connecting 213.152.162.110:443. 2016.12.04 08:08:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:50569 [nonblock]. 2016.12.04 08:08:18 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:50569. 2016.12.04 08:08:18 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.12.04 08:08:18 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:50569. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: s_connect: connected 213.152.162.110:443. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.113:6303. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: SNI: sending servername: 213.152.162.110. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: Peer certificate required. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: CERT: Locally installed certificate matched. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: Client certificate not requested. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: SSL connected: new session negotiated. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.12.04 08:08:18 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:50569, sid=a4c7c4b0 1d361a80. 2016.12.04 08:08:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.12.04 08:08:19 - OpenVPN > Validating certificate key usage. 2016.12.04 08:08:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.12.04 08:08:19 - OpenVPN > VERIFY KU OK. 2016.12.04 08:08:19 - OpenVPN > Validating certificate extended key usage. 2016.12.04 08:08:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.12.04 08:08:19 - OpenVPN > VERIFY EKU OK. 2016.12.04 08:08:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.12.04 08:08:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.04 08:08:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:08:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.12.04 08:08:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.12.04 08:08:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.12.04 08:08:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:50569. 2016.12.04 08:08:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.12.04 08:08:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.7.235 255.255.0.0'. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.12.04 08:08:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=c0:38:96:6c:00:0d. 2016.12.04 08:08:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.12.04 08:08:21 - OpenVPN > open_tun, tt->ipv6=0. 2016.12.04 08:08:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DAAE7FB6-A999-49B8-9A17-85038F667F47}.tap. 2016.12.04 08:08:22 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.12.04 08:08:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.7.235/255.255.0.0 [sUCCEEDED]. 2016.12.04 08:08:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.7.235/255.255.0.0 on interface {DAAE7FB6-A999-49B8-9A17-85038F667F47} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.12.04 08:08:22 - OpenVPN > Successful ARP Flush on interface [19] {DAAE7FB6-A999-49B8-9A17-85038F667F47}. 2016.12.04 08:08:27 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.12.04 08:08:27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=3]. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.12.04 08:08:27 - OpenVPN > Route addition fallback to route.exe. 2016.12.04 08:08:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.12.04 08:08:27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=19]. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.12.04 08:08:27 - OpenVPN > Route addition fallback to route.exe. 2016.12.04 08:08:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.12.04 08:08:27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=19]. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.12.04 08:08:27 - OpenVPN > Route addition fallback to route.exe. 2016.12.04 08:08:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.110 MASK 255.255.255.255 192.168.0.1. 2016.12.04 08:08:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.12.04 08:08:27 - Starting Management Interface. 2016.12.04 08:08:27 - OpenVPN > Initialization Sequence Completed. 2016.12.04 08:08:27 - DNS leak protection with packet filtering enabled.. 2016.12.04 08:08:27 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, from automatic (192.168.0.1) to 10.50.0.1)I 2016.12.04 08:08:27 - Flushing DNSI 2016.12.04 08:08:33 - Checking routeI 2016.12.04 08:08:35 - Checking DNS! 2016.12.04 08:08:47 - Connected.. 2016.12.04 08:08:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2016.12.04 08:08:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.12.04 08:09:18 - SSL > 2016.12.04 08:09:18 LOG6[cron]: Executing cron jobs. 2016.12.04 08:09:18 - SSL > 2016.12.04 08:09:18 LOG6[cron]: Cron jobs completed in 0 seconds. 2016.12.04 08:12:28 - Updating systems & servers data .... 2016.12.04 08:12:56 - Systems & servers data update completed. 2016.12.04 08:14:09 - SSL > 2016.12.04 08:14:09 LOG3[0]: SSL_write: Connection reset by peer (WSAECONNRESET) (10054). 2016.12.04 08:14:09 - OpenVPN > Connection reset, restarting [-1]. 2016.12.04 08:14:09 - SSL > 2016.12.04 08:14:09 LOG5[0]: Connection reset: 13292309 byte(s) sent to SSL, 233597475 byte(s) sent to socket. 2016.12.04 08:14:09 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.12.04 08:14:09 - OpenVPN > Restart pause, 5 second(s)! 2016.12.04 08:14:09 - Disconnecting. 2016.12.04 08:14:09 - Management - Send 'signal SIGTERM'. 2016.12.04 08:14:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.12.04 08:14:09 - OpenVPN > MANAGEMENT: Client disconnected. 2016.12.04 08:14:09 - OpenVPN > Assertion failed at misc.c:785 (es). 2016.12.04 08:14:09 - OpenVPN > Exiting due to fatal error. 2016.12.04 08:14:10 - Connection terminated.. 2016.12.04 08:14:10 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, to automatic). 2016.12.04 08:14:10 - DNS leak protection with packet filtering disabled.I 2016.12.04 08:14:13 - Checking authorization ... Quote Share this post Link to post
Khariz 109 Posted ... Have you tried using a standard UDP 443 connection? Or even a standard TCP connection that doesn't use SSL? Or are you having to use SSL for a particular reason? No reason to do that unless you are using it for a particular reason. Quote Share this post Link to post
ometec 1 Posted ... Hello Khariz.Since VPN usage is banned by law in some countries, it is safer to use SSL tunner i believe in my case.And SSL tunnel support is one of the main reasons why i have chosen AirVPN as provider.Thanks... Quote Share this post Link to post
Khariz 109 Posted ... Okay. That was the point of my post. If you NEED to use SSL, then we can troubleshoot your issues that way. I was just making sure it was necessary to troubleshoot the SSL stuff. It jumped out at me as "unusual", and I was just making sure that you needed it before going deeper down that rabbit hole. SSL_write: Connection reset by peer (WSAECONNRESET) (10054) That seems to be the issue. Are you saying that this spontaneously begins occurring 30 minute into your connection? Quote Share this post Link to post
ometec 1 Posted ... Hi Khariz,Yes almost every 30 minutes (or sometimes less) i am disconnecting from network and then automatically the client is reconnecting.I have also tried to install another version of TAP driver, but it did not help.In addition, i do not have wifi connectivity issue since on other devices or on this device i do not face any intetner disconnections (while using without VPN).I will be glad if we can find a solution... thanks... Quote Share this post Link to post
ometec 1 Posted ... Hi all,disconenction problem continues... i am having random disconnections while using SSL tunnel 443....Any helping ideas?Thanks Quote Share this post Link to post
Khariz 109 Posted ... One more random question: Have you tried other SSL ports? I'm assuming the error would still occur, but I'm curious? How about an SSH 80 connection? Quote Share this post Link to post
ometec 1 Posted ... Hello, yes the same issue while conencted via different ports.. random disconnections (on SSL tunneled ports).. Quote Share this post Link to post
LZ1 672 Posted ... Do you remember to disconnect and/or restart the client every time you change protocol? How about setting your TAP driver media status to "Always Connected" ? Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
ometec 1 Posted ... Hi LZ1, i had tried before keeping the tap driver always connected - i will ensure to do it again....Yes each time i change protocol, i restart the client... Quote Share this post Link to post
zhang888 1066 Posted ... There is a device sending TCP_RST packets in your SSL tunnel, in some countries they implement this in order to block various VPNs and Tor bridges.For example, Belarus started doing this since last week to block Tor:https://ooni.torproject.org/post/belarus-fries-onion/ Try SSH or regular TCP methods to see if there is a deep packet inspection device on your side. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post