Jump to content
Not connected, Your IP: 3.144.109.159
ometec

disconnecting frequently

Recommended Posts

Dear members,

 

I am having frequent disconnections while using the SSL or SSH layered connections. Since i am based at UAE i prefer to use these layers protocols rather than other alternatives, but on average every 30-45 mins i am disconnecting from the service.

 

I am using the beta latest version as eddie client and i am facing this issue across several different servers. Attached you may find the log file for your review. I am using Windows 10 as operating system.

 

Looking forward to have a solution to this problem.... Thanks...

Eddie_20161203_163919.txt

Share this post


Link to post

Hello!

 

Please download the latest Beta client . But don't use Network Lock in conjunction with the routes feature, as there's a bug currently.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

In case you are wondering why LZ1 responded the way he did, you claimed you are using the latest Beta, but your logs say "Eddie client version: 2.11.5".  The most current beta version is 2.11.8

Share this post


Link to post

Thanks gents, i have updated my client to latest 2.11.8 version...

question :  if i disable network lock, i may face a dns leak issue.. .still would you recommend to keep network lock off? 

thanks

Share this post


Link to post

Thanks gents, i have updated my client to latest 2.11.8 version...

question :  if i disable network lock, i may face a dns leak issue.. .still would you recommend to keep network lock off? 

thanks

 

The network lock may only cause issues in conjunction with custom routes. If you are not using any custom routes it works perfectly

so there is no reason to disable it.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

Dear members,

 

I am having frequent disconnections while using the SSL or SSH layered connections. Since i am based at UAE i prefer to use these layers protocols rather than other alternatives, but on average every 30-45 mins i am disconnecting from the service.

 

I am using the beta latest version as eddie client and i am facing this issue across several different servers. Attached you may find the log file for your review. I am using Windows 10 as operating system.

 

Looking forward to have a solution to this problem.... Thanks...

 

As LZ1 said, update Eddie. You are on the 2.11.5 beta, Air has since released 2.11.8 beta. You may find it on the download page and click other versions and experimental same as you did before. 

 

Let us know if it makes any difference for you.

Share this post


Link to post

I have updated client version to the latest 2.11.8... in addition there is no use of functions in routes feature...

unfortunately still disconnections are happening... below you may see the logs, i have copied in the message...

help please, thanks....

 

 

I 2016.12.04 08:01:52 - Eddie client version: 2.11.8 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319
. 2016.12.04 08:01:52 - Reading options from C:\Users\Emre\AppData\Local\AirVPN\AirVPN.xml
. 2016.12.04 08:01:53 - Data path: C:\Users\Emre\AppData\Local\AirVPN
. 2016.12.04 08:01:53 - Application path: C:\Program Files\AirVPN
. 2016.12.04 08:01:53 - Executable path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.04 08:01:53 - Command line arguments (1): path="home"
. 2016.12.04 08:01:53 - Operating System: Microsoft Windows NT 10.0.14393.0
I 2016.12.04 08:01:57 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2016.12.04 08:01:57 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.04 08:01:57 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.04 08:01:57 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.12.04 08:01:57 - Activation of Network Lock - Windows Filtering Platform
! 2016.12.04 08:01:57 - Ready
. 2016.12.04 08:01:57 - Updating systems & servers data ...
I 2016.12.04 08:02:02 - Session starting.
. 2016.12.04 08:02:10 - IPv6 disabled with packet filtering.
I 2016.12.04 08:02:10 - Checking authorization ...
. 2016.12.04 08:02:23 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (The operation has timed out)
! 2016.12.04 08:02:24 - Connecting to Chara (Netherlands, Alblasserdam)
. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j  26 Sep 2016
. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\67a035fc515279c7a3605c09dbf40fdd8fb56455dd038e50827733dd5f53cb12.tmp.ssl
. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG6[ui]: Initializing service [openvpn]
. 2016.12.04 08:02:24 - SSL > 2016.12.04 08:02:24 LOG5[ui]: Configuration successful
. 2016.12.04 08:02:24 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.04 08:02:24 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.04 08:02:24 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.04 08:02:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.12.04 08:02:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.04 08:02:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.04 08:02:25 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:34426 [nonblock]
. 2016.12.04 08:02:25 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:34426
. 2016.12.04 08:02:25 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.04 08:02:25 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:34426
. 2016.12.04 08:02:25 - SSL > 2016.12.04 08:02:25 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:4269
. 2016.12.04 08:02:25 - SSL > 2016.12.04 08:02:25 LOG6[0]: s_connect: connecting 109.232.227.134:443
. 2016.12.04 08:02:35 - SSL > 2016.12.04 08:02:35 LOG3[0]: s_connect: s_poll_wait 109.232.227.134:443: TIMEOUTconnect exceeded
. 2016.12.04 08:02:35 - SSL > 2016.12.04 08:02:35 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.12.04 08:02:35 - OpenVPN > Connection reset, restarting [-1]
. 2016.12.04 08:02:35 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.12.04 08:02:35 - OpenVPN > Restart pause, 5 second(s)
! 2016.12.04 08:02:35 - Disconnecting
. 2016.12.04 08:02:35 - Connection terminated.
I 2016.12.04 08:02:38 - Checking authorization ...
! 2016.12.04 08:02:39 - Connecting to Anser (Netherlands, Alblasserdam)
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j  26 Sep 2016
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\cc04d441def7d34fc8b4e1af647b32b3c6aa0e43ea66578cb9b199188b03fdba.tmp.ssl
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG6[ui]: Initializing service [openvpn]
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[ui]: Configuration successful
. 2016.12.04 08:02:39 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.04 08:02:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.04 08:02:39 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.04 08:02:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.12.04 08:02:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.04 08:02:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.04 08:02:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:19666 [nonblock]
. 2016.12.04 08:02:39 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:19666
. 2016.12.04 08:02:39 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.04 08:02:39 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:19666
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:4276
. 2016.12.04 08:02:39 - SSL > 2016.12.04 08:02:39 LOG6[0]: s_connect: connecting 109.202.103.171:443
. 2016.12.04 08:02:49 - SSL > 2016.12.04 08:02:49 LOG3[0]: s_connect: s_poll_wait 109.202.103.171:443: TIMEOUTconnect exceeded
. 2016.12.04 08:02:49 - SSL > 2016.12.04 08:02:49 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.12.04 08:02:49 - OpenVPN > Connection reset, restarting [-1]
. 2016.12.04 08:02:49 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.12.04 08:02:49 - OpenVPN > Restart pause, 5 second(s)
! 2016.12.04 08:02:49 - Disconnecting
. 2016.12.04 08:02:49 - Connection terminated.
I 2016.12.04 08:02:52 - Checking authorization ...
! 2016.12.04 08:02:53 - Connecting to Zibal (Netherlands, Alblasserdam)
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j  26 Sep 2016
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\7afa53570127c1399f3ccb5290659a8b3c55809898495a89a1f587b4740b329e.tmp.ssl
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[ui]: Initializing service [openvpn]
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[ui]: Configuration successful
. 2016.12.04 08:02:53 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.04 08:02:53 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.04 08:02:53 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.04 08:02:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.12.04 08:02:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.04 08:02:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.04 08:02:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:37169 [nonblock]
. 2016.12.04 08:02:53 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:37169
. 2016.12.04 08:02:53 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.04 08:02:53 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:37169
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:4285
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: s_connect: connecting 213.152.161.150:443
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: s_connect: connected 213.152.161.150:443
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.113:4286
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: SNI: sending servername: 213.152.161.150
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: Peer certificate required
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: Client certificate not requested
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: SSL connected: new session negotiated
. 2016.12.04 08:02:53 - SSL > 2016.12.04 08:02:53 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.04 08:02:54 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:37169, sid=c3e29bf6 c546ee8b
. 2016.12.04 08:02:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.04 08:02:54 - OpenVPN > Validating certificate key usage
. 2016.12.04 08:02:54 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.04 08:02:54 - OpenVPN > VERIFY KU OK
. 2016.12.04 08:02:54 - OpenVPN > Validating certificate extended key usage
. 2016.12.04 08:02:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.04 08:02:54 - OpenVPN > VERIFY EKU OK
. 2016.12.04 08:02:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.04 08:02:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.04 08:02:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.04 08:02:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:02:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.04 08:02:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:37169
. 2016.12.04 08:02:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.04 08:02:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.6.196 255.255.0.0'
. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.04 08:02:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.04 08:02:57 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=c0:38:96:6c:00:0d
. 2016.12.04 08:02:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.04 08:02:57 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.04 08:02:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DAAE7FB6-A999-49B8-9A17-85038F667F47}.tap
. 2016.12.04 08:02:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.04 08:02:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.6.196/255.255.0.0 [sUCCEEDED]
. 2016.12.04 08:02:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.6.196/255.255.0.0 on interface {DAAE7FB6-A999-49B8-9A17-85038F667F47} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.04 08:02:57 - OpenVPN > Successful ARP Flush on interface [19] {DAAE7FB6-A999-49B8-9A17-85038F667F47}
. 2016.12.04 08:03:02 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.04 08:03:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.150 MASK 255.255.255.255 192.168.0.1
. 2016.12.04 08:03:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2016.12.04 08:03:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.04 08:03:02 - Starting Management Interface
. 2016.12.04 08:03:02 - OpenVPN > Initialization Sequence Completed
. 2016.12.04 08:03:02 - DNS leak protection with packet filtering enabled.
. 2016.12.04 08:03:02 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, from automatic (192.168.0.1) to 10.50.0.1)
I 2016.12.04 08:03:02 - Flushing DNS
I 2016.12.04 08:03:08 - Checking route
I 2016.12.04 08:03:09 - Checking DNS
! 2016.12.04 08:03:22 - Connected.
. 2016.12.04 08:03:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2016.12.04 08:03:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.04 08:03:53 - SSL > 2016.12.04 08:03:53 LOG6[cron]: Executing cron jobs
. 2016.12.04 08:03:53 - SSL > 2016.12.04 08:03:53 LOG6[cron]: Cron jobs completed in 0 seconds
. 2016.12.04 08:07:04 - SSL > 2016.12.04 08:07:04 LOG6[0]: SSL closed (SSL_read)
. 2016.12.04 08:07:04 - OpenVPN > Connection reset, restarting [0]
. 2016.12.04 08:07:04 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.12.04 08:07:04 - OpenVPN > Restart pause, 5 second(s)
! 2016.12.04 08:07:04 - Disconnecting
. 2016.12.04 08:07:04 - Management - Send 'signal SIGTERM'
. 2016.12.04 08:07:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.04 08:07:04 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.04 08:07:04 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.04 08:07:04 - OpenVPN > Exiting due to fatal error
. 2016.12.04 08:07:04 - Connection terminated.
. 2016.12.04 08:07:04 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, to automatic)
. 2016.12.04 08:07:05 - DNS leak protection with packet filtering disabled.
I 2016.12.04 08:07:08 - Checking authorization ...
W 2016.12.04 08:07:33 - Authorization check failed, continue anyway ({1])
. 2016.12.04 08:07:33 - IPv6 restored with packet filtering.
! 2016.12.04 08:07:41 - Session terminated.
I 2016.12.04 08:07:41 - Session starting.
. 2016.12.04 08:07:49 - IPv6 disabled with packet filtering.
I 2016.12.04 08:07:49 - Checking authorization ...
! 2016.12.04 08:07:50 - Connecting to Elnath (Netherlands, Alblasserdam)
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j  26 Sep 2016
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\afdb277f39e43db9021ca628d2fda1624b4159cb27599c435520a019d5b85db4.tmp.ssl
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG6[ui]: Initializing service [openvpn]
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[ui]: Configuration successful
. 2016.12.04 08:07:50 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.04 08:07:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.04 08:07:50 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.04 08:07:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.12.04 08:07:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.04 08:07:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:07:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:6290
. 2016.12.04 08:07:50 - SSL > 2016.12.04 08:07:50 LOG6[0]: s_connect: connecting 213.152.180.6:443
. 2016.12.04 08:07:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.04 08:07:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:7400 [nonblock]
. 2016.12.04 08:07:50 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:7400
. 2016.12.04 08:07:50 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.04 08:07:50 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:7400
. 2016.12.04 08:08:00 - SSL > 2016.12.04 08:08:00 LOG3[0]: s_connect: s_poll_wait 213.152.180.6:443: TIMEOUTconnect exceeded
. 2016.12.04 08:08:00 - SSL > 2016.12.04 08:08:00 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.12.04 08:08:00 - OpenVPN > Connection reset, restarting [-1]
. 2016.12.04 08:08:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.12.04 08:08:00 - OpenVPN > Restart pause, 5 second(s)
! 2016.12.04 08:08:00 - Disconnecting
. 2016.12.04 08:08:00 - Connection terminated.
I 2016.12.04 08:08:03 - Checking authorization ...
! 2016.12.04 08:08:04 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j  26 Sep 2016
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\88cb1044887569f4a97a17ae9d6b9ed99906e08a2e025d9fd07246b95ab6fb7b.tmp.ssl
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG6[ui]: Initializing service [openvpn]
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[ui]: Configuration successful
. 2016.12.04 08:08:04 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.04 08:08:04 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.04 08:08:04 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.04 08:08:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.12.04 08:08:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:6296
. 2016.12.04 08:08:04 - SSL > 2016.12.04 08:08:04 LOG6[0]: s_connect: connecting 109.202.107.16:443
. 2016.12.04 08:08:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:08:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:08:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.04 08:08:04 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:55317 [nonblock]
. 2016.12.04 08:08:04 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:55317
. 2016.12.04 08:08:04 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.04 08:08:04 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55317
. 2016.12.04 08:08:14 - SSL > 2016.12.04 08:08:14 LOG3[0]: s_connect: s_poll_wait 109.202.107.16:443: TIMEOUTconnect exceeded
. 2016.12.04 08:08:14 - SSL > 2016.12.04 08:08:14 LOG5[0]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
. 2016.12.04 08:08:14 - OpenVPN > Connection reset, restarting [-1]
. 2016.12.04 08:08:14 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.12.04 08:08:14 - OpenVPN > Restart pause, 5 second(s)
! 2016.12.04 08:08:14 - Disconnecting
. 2016.12.04 08:08:14 - Connection terminated.
I 2016.12.04 08:08:17 - Checking authorization ...
! 2016.12.04 08:08:17 - Connecting to Jabbah (Netherlands, Alblasserdam)
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j  26 Sep 2016
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Reading configuration from file C:\Users\Emre\AppData\Local\AirVPN\abda6ac434f6427e36ba24cf4ae9e2104e0703d67d5990868c63f09ac79a04c7.tmp.ssl
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[ui]: Initializing service [openvpn]
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[ui]: Configuration successful
. 2016.12.04 08:08:18 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.04 08:08:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2016.12.04 08:08:18 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.04 08:08:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2016.12.04 08:08:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.04 08:08:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:08:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:6302
. 2016.12.04 08:08:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: s_connect: connecting 213.152.162.110:443
. 2016.12.04 08:08:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:50569 [nonblock]
. 2016.12.04 08:08:18 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:50569
. 2016.12.04 08:08:18 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.04 08:08:18 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:50569
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: s_connect: connected 213.152.162.110:443
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.113:6303
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: SNI: sending servername: 213.152.162.110
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: Peer certificate required
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: Client certificate not requested
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: SSL connected: new session negotiated
. 2016.12.04 08:08:18 - SSL > 2016.12.04 08:08:18 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.04 08:08:18 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:50569, sid=a4c7c4b0 1d361a80
. 2016.12.04 08:08:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.04 08:08:19 - OpenVPN > Validating certificate key usage
. 2016.12.04 08:08:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.04 08:08:19 - OpenVPN > VERIFY KU OK
. 2016.12.04 08:08:19 - OpenVPN > Validating certificate extended key usage
. 2016.12.04 08:08:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.04 08:08:19 - OpenVPN > VERIFY EKU OK
. 2016.12.04 08:08:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.04 08:08:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.04 08:08:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:08:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.04 08:08:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.04 08:08:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.04 08:08:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:50569
. 2016.12.04 08:08:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.04 08:08:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.7.235 255.255.0.0'
. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.04 08:08:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.04 08:08:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=c0:38:96:6c:00:0d
. 2016.12.04 08:08:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.04 08:08:21 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.04 08:08:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DAAE7FB6-A999-49B8-9A17-85038F667F47}.tap
. 2016.12.04 08:08:22 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.04 08:08:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.7.235/255.255.0.0 [sUCCEEDED]
. 2016.12.04 08:08:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.7.235/255.255.0.0 on interface {DAAE7FB6-A999-49B8-9A17-85038F667F47} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.04 08:08:22 - OpenVPN > Successful ARP Flush on interface [19] {DAAE7FB6-A999-49B8-9A17-85038F667F47}
. 2016.12.04 08:08:27 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.04 08:08:27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=3]
. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.04 08:08:27 - OpenVPN > Route addition fallback to route.exe
. 2016.12.04 08:08:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.04 08:08:27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=19]
. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.04 08:08:27 - OpenVPN > Route addition fallback to route.exe
. 2016.12.04 08:08:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.04 08:08:27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=19]
. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.04 08:08:27 - OpenVPN > Route addition fallback to route.exe
. 2016.12.04 08:08:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.04 08:08:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.110 MASK 255.255.255.255 192.168.0.1
. 2016.12.04 08:08:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2016.12.04 08:08:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.04 08:08:27 - Starting Management Interface
. 2016.12.04 08:08:27 - OpenVPN > Initialization Sequence Completed
. 2016.12.04 08:08:27 - DNS leak protection with packet filtering enabled.
. 2016.12.04 08:08:27 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, from automatic (192.168.0.1) to 10.50.0.1)
I 2016.12.04 08:08:27 - Flushing DNS
I 2016.12.04 08:08:33 - Checking route
I 2016.12.04 08:08:35 - Checking DNS
! 2016.12.04 08:08:47 - Connected.
. 2016.12.04 08:08:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2016.12.04 08:08:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.04 08:09:18 - SSL > 2016.12.04 08:09:18 LOG6[cron]: Executing cron jobs
. 2016.12.04 08:09:18 - SSL > 2016.12.04 08:09:18 LOG6[cron]: Cron jobs completed in 0 seconds
. 2016.12.04 08:12:28 - Updating systems & servers data ...
. 2016.12.04 08:12:56 - Systems & servers data update completed
. 2016.12.04 08:14:09 - SSL > 2016.12.04 08:14:09 LOG3[0]: SSL_write: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.12.04 08:14:09 - OpenVPN > Connection reset, restarting [-1]
. 2016.12.04 08:14:09 - SSL > 2016.12.04 08:14:09 LOG5[0]: Connection reset: 13292309 byte(s) sent to SSL, 233597475 byte(s) sent to socket
. 2016.12.04 08:14:09 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.12.04 08:14:09 - OpenVPN > Restart pause, 5 second(s)
! 2016.12.04 08:14:09 - Disconnecting
. 2016.12.04 08:14:09 - Management - Send 'signal SIGTERM'
. 2016.12.04 08:14:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.04 08:14:09 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.04 08:14:09 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.04 08:14:09 - OpenVPN > Exiting due to fatal error
. 2016.12.04 08:14:10 - Connection terminated.
. 2016.12.04 08:14:10 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter, to automatic)
. 2016.12.04 08:14:10 - DNS leak protection with packet filtering disabled.
I 2016.12.04 08:14:13 - Checking authorization ...
 

Share this post


Link to post

Have you tried using a standard UDP 443 connection? Or even a standard TCP connection that doesn't use SSL? Or are you having to use SSL for a particular reason? No reason to do that unless you are using it for a particular reason.

Share this post


Link to post

Hello Khariz.

Since VPN usage is banned by law in some countries, it is safer to use SSL tunner i believe in my case.

And SSL tunnel support is one of the main reasons why i have chosen AirVPN as provider.

Thanks...

Share this post


Link to post

Okay. That was the point of my post. If you NEED to use SSL, then we can troubleshoot your issues that way. I was just making sure it was necessary to troubleshoot the SSL stuff. It jumped out at me as "unusual", and I was just making sure that you needed it before going deeper down that rabbit hole.

 

SSL_write: Connection reset by peer (WSAECONNRESET) (10054)

 

That seems to be the issue. Are you saying that this spontaneously begins occurring 30 minute into your connection?

Share this post


Link to post

Hi Khariz,

Yes almost every 30 minutes (or sometimes less) i am disconnecting from network and then automatically the client is reconnecting.

I have also tried to install another version of TAP driver, but it did not help.

In addition, i do not have wifi connectivity issue since on other devices or on this device i do not face any intetner disconnections (while using without VPN).

I will be glad if we can find a solution... thanks...

Share this post


Link to post

Hi all,

disconenction problem continues... i am having random disconnections while using SSL tunnel 443....

Any helping ideas?

Thanks

Share this post


Link to post

One more random question:  Have you tried other SSL ports? I'm assuming the error would still occur, but I'm curious?  

 

 

How about an SSH 80 connection?

Share this post


Link to post

Hello, yes the same issue while conencted via different ports.. random disconnections (on SSL tunneled ports)..

Share this post


Link to post

Do you remember to disconnect and/or restart the client every time you change protocol?

 

How about setting your TAP driver media status to "Always Connected" ?


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hi LZ1, i had tried before keeping the tap driver always connected - i will ensure to do it again....

Yes each time i change protocol, i restart the client...

Share this post


Link to post

There is a device sending TCP_RST packets in your SSL tunnel, in some countries they implement this in order to block various VPNs and Tor bridges.

For example, Belarus started doing this since last week to block Tor:

https://ooni.torproject.org/post/belarus-fries-onion/

 

Try SSH or regular TCP methods to see if there is a deep packet inspection device on your side.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...