Jump to content
Not connected, Your IP: 44.200.240.205
techocity

Slow speeds/Random Disconnections/Re-connection Failures

Recommended Posts

Hi,
 
I have been using AirVPN a few days now. I am still on the fence whether it's worth having a VPN at all since I have been experiencing random disconnects and slow speeds. I've searched this forum for help, but I couldn't find a good working solution, so I could do with some help from this awesome community which to be fair has been helpful with providing various guides and solutions, so well done guys   
 
This is my current setup:

  • Windows 7 x64 / 4GB RAM / Intel Core Duo 2 - 2GHz
  • Connected wireless 5GHz to my Virgin Media SuperHub 2/Router mode enabled. 
  • Eddie 2.11.9

 

I have tried the mssfix and downgraded to TAP to 9.9.2_3 as suggested by others here. I don't think it has improved my experience with AirVPN.

 
To give you an idea what speeds I get with and without VPN...
 
I get a good solid 70Mbps without
 
147908465520030681695.png
 
 
And with from lowest to highest
 
148146714048843193473.png
 
148146814538885895923.png
 
The latest test
 
148156900008142498704.png
 
 

Log

I 2016.12.12 15:31:08 - Eddie client version: 2.11.9 / windows_x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net Framework: v2.0.50727
. 2016.12.12 15:31:08 - Reading options from C:\Users\Acer\AppData\Local\AirVPN\AirVPN.xml
. 2016.12.12 15:31:09 - Data path: C:\Users\Acer\AppData\Local\AirVPN
. 2016.12.12 15:31:09 - Application path: C:\Program Files\AirVPN
. 2016.12.12 15:31:09 - Executable path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.12 15:31:09 - Command line arguments (1): path="home"
. 2016.12.12 15:31:09 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
I 2016.12.12 15:31:20 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2
I 2016.12.12 15:31:20 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.12 15:31:20 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.12 15:31:20 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.12.12 15:31:22 - Activation of Network Lock - Windows Filtering Platform
. 2016.12.12 15:31:23 - Updating systems & servers data ...
I 2016.12.12 15:31:23 - Session starting.
. 2016.12.12 15:31:26 - Systems & servers data update completed
. 2016.12.12 15:31:35 - IPv6 disabled with packet filtering.
I 2016.12.12 15:31:35 - Checking authorization ...
! 2016.12.12 15:31:36 - Connecting to Alshain (United Kingdom, London)
. 2016.12.12 15:31:36 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.12 15:31:36 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.12 15:31:36 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.12 15:31:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.12 15:31:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.12 15:31:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 15:31:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 15:31:36 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.12 15:31:36 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.12 15:31:36 - OpenVPN > UDPv4 link remote: [AF_INET]217.151.98.162:443
. 2016.12.12 15:31:36 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.162:443, sid=2a1a5a69 33330331
. 2016.12.12 15:31:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.12 15:31:36 - OpenVPN > Validating certificate key usage
. 2016.12.12 15:31:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.12 15:31:36 - OpenVPN > VERIFY KU OK
. 2016.12.12 15:31:36 - OpenVPN > Validating certificate extended key usage
. 2016.12.12 15:31:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.12 15:31:36 - OpenVPN > VERIFY EKU OK
. 2016.12.12 15:31:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.12 15:31:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 15:31:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 15:31:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 15:31:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 15:31:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.12 15:31:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.162:443
. 2016.12.12 15:31:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.12 15:31:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.181 255.255.0.0'
. 2016.12.12 15:31:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.12 15:31:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.12 15:31:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.12 15:31:41 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.12 15:31:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.12 15:31:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.12 15:31:41 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.12 15:31:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.12 15:31:41 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.12 15:31:41 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.12 15:31:41 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.12 15:31:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.181/255.255.0.0 [sUCCEEDED]
. 2016.12.12 15:31:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.181/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.12 15:31:41 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.12 15:31:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.12 15:31:45 - OpenVPN > C:\Windows\system32\route.exe ADD 217.151.98.162 MASK 255.255.255.255 192.168.0.1
. 2016.12.12 15:31:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.12 15:31:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.12 15:31:45 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.12 15:31:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.12 15:31:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.12 15:31:45 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.12 15:31:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.12 15:31:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.12 15:31:45 - Starting Management Interface
. 2016.12.12 15:31:45 - OpenVPN > Initialization Sequence Completed
. 2016.12.12 15:31:46 - DNS leak protection with packet filtering enabled.
. 2016.12.12 15:31:46 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.12 15:31:46 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.12 15:31:46 - Flushing DNS
I 2016.12.12 15:31:55 - Checking route
I 2016.12.12 15:31:56 - Checking DNS
! 2016.12.12 15:31:56 - Connected.
. 2016.12.12 15:31:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.12 15:31:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.12 15:41:45 - Updating systems & servers data ...
. 2016.12.12 15:41:45 - Systems & servers data update completed
. 2016.12.12 15:52:50 - Updating systems & servers data ...
. 2016.12.12 15:52:51 - Systems & servers data update completed
. 2016.12.12 16:03:46 - Updating systems & servers data ...
. 2016.12.12 16:03:47 - Systems & servers data update completed
. 2016.12.12 16:14:43 - Updating systems & servers data ...
. 2016.12.12 16:14:43 - Systems & servers data update completed
. 2016.12.12 16:25:39 - Updating systems & servers data ...
. 2016.12.12 16:25:39 - Systems & servers data update completed
. 2016.12.12 16:31:36 - OpenVPN > TLS: soft reset sec=0 bytes=27251105/-1 pkts=47965/0
. 2016.12.12 16:31:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.12 16:31:36 - OpenVPN > Validating certificate key usage
. 2016.12.12 16:31:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.12 16:31:36 - OpenVPN > VERIFY KU OK
. 2016.12.12 16:31:36 - OpenVPN > Validating certificate extended key usage
. 2016.12.12 16:31:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.12 16:31:36 - OpenVPN > VERIFY EKU OK
. 2016.12.12 16:31:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.12 16:31:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 16:31:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 16:31:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 16:31:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 16:31:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.12 16:36:32 - Updating systems & servers data ...
. 2016.12.12 16:36:33 - Systems & servers data update completed
. 2016.12.12 16:47:17 - Updating systems & servers data ...
. 2016.12.12 16:47:17 - Systems & servers data update completed
. 2016.12.12 16:57:42 - Updating systems & servers data ...
. 2016.12.12 16:57:42 - Systems & servers data update completed
. 2016.12.12 17:08:28 - Updating systems & servers data ...
. 2016.12.12 17:08:31 - Systems & servers data update completed
. 2016.12.12 17:19:17 - Updating systems & servers data ...
. 2016.12.12 17:19:17 - Systems & servers data update completed
. 2016.12.12 17:29:35 - Updating systems & servers data ...
. 2016.12.12 17:29:36 - Systems & servers data update completed
. 2016.12.12 17:31:36 - OpenVPN > TLS: soft reset sec=0 bytes=761079792/-1 pkts=791068/0
. 2016.12.12 17:31:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.12 17:31:36 - OpenVPN > Validating certificate key usage
. 2016.12.12 17:31:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.12 17:31:36 - OpenVPN > VERIFY KU OK
. 2016.12.12 17:31:36 - OpenVPN > Validating certificate extended key usage
. 2016.12.12 17:31:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.12 17:31:36 - OpenVPN > VERIFY EKU OK
. 2016.12.12 17:31:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.12 17:31:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 17:31:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 17:31:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 17:31:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 17:31:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.12 17:40:19 - Updating systems & servers data ...
. 2016.12.12 17:40:20 - Systems & servers data update completed
. 2016.12.12 17:51:05 - Updating systems & servers data ...
. 2016.12.12 17:51:05 - Systems & servers data update completed
. 2016.12.12 18:02:01 - Updating systems & servers data ...
. 2016.12.12 18:02:02 - Systems & servers data update completed
. 2016.12.12 18:12:54 - Updating systems & servers data ...
. 2016.12.12 18:12:54 - Systems & servers data update completed
. 2016.12.12 18:16:42 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.12 18:16:42 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.12 18:16:42 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.12 18:16:42 - Disconnecting
. 2016.12.12 18:16:42 - Management - Send 'signal SIGTERM'
. 2016.12.12 18:16:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.12 18:16:42 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.12 18:16:42 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.12 18:16:42 - OpenVPN > Exiting due to fatal error
. 2016.12.12 18:16:43 - Connection terminated.
. 2016.12.12 18:16:45 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.12 18:16:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.12 18:16:46 - DNS leak protection with packet filtering disabled.
I 2016.12.12 18:17:27 - Checking authorization ...
W 2016.12.12 18:17:28 - Authorization check failed, continue anyway ({1])
! 2016.12.12 18:17:28 - Connecting to Columba (Belgium, Brussels)
. 2016.12.12 18:18:01 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.12 18:18:01 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.12 18:18:01 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.12 18:18:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.12 18:18:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.12 18:18:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:18:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:18:01 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.12 18:18:01 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.12 18:18:01 - OpenVPN > UDPv4 link remote: [AF_INET]194.187.251.114:443
. 2016.12.12 18:18:04 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2016.12.12 18:18:04 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.12 18:18:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2016.12.12 18:18:10 - Disconnecting
. 2016.12.12 18:18:10 - Connection terminated.
I 2016.12.12 18:18:13 - Checking authorization ...
W 2016.12.12 18:18:13 - Authorization check failed, continue anyway ({1])
! 2016.12.12 18:18:13 - Connecting to Capricornus (Belgium, Brussels)
. 2016.12.12 18:18:13 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.12 18:18:13 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.12 18:18:13 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.12 18:18:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.12 18:18:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.12 18:18:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:18:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:18:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.12 18:18:13 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.12 18:18:13 - OpenVPN > UDPv4 link remote: [AF_INET]194.187.251.90:443
. 2016.12.12 18:18:45 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2016.12.12 18:18:45 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.12 18:18:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2016.12.12 18:18:51 - Disconnecting
. 2016.12.12 18:18:51 - Connection terminated.
I 2016.12.12 18:18:54 - Checking authorization ...
W 2016.12.12 18:18:54 - Authorization check failed, continue anyway ({1])
! 2016.12.12 18:18:54 - Connecting to Mebsuta (Belgium, Brussels)
. 2016.12.12 18:18:54 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.12 18:18:54 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.12 18:18:54 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.12 18:18:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.12 18:18:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.12 18:18:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:18:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:18:54 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.12 18:18:54 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.12 18:18:54 - OpenVPN > UDPv4 link remote: [AF_INET]194.187.251.154:443
. 2016.12.12 18:19:24 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=ce67c0b2 f25e6499
. 2016.12.12 18:19:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.12 18:19:24 - OpenVPN > Validating certificate key usage
. 2016.12.12 18:19:24 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.12 18:19:24 - OpenVPN > VERIFY KU OK
. 2016.12.12 18:19:24 - OpenVPN > Validating certificate extended key usage
. 2016.12.12 18:19:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.12 18:19:24 - OpenVPN > VERIFY EKU OK
. 2016.12.12 18:19:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.12 18:19:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 18:19:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:19:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 18:19:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 18:19:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.12 18:19:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]194.187.251.154:443
. 2016.12.12 18:19:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.12 18:19:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.244 255.255.0.0'
. 2016.12.12 18:19:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.12 18:19:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.12 18:19:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.12 18:19:27 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.12 18:19:27 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.12 18:19:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.12 18:19:27 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.12 18:19:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.12 18:19:27 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.12 18:19:28 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.12 18:19:28 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.12 18:19:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.244/255.255.0.0 [sUCCEEDED]
. 2016.12.12 18:19:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.244/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.12 18:19:28 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.12 18:19:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.12 18:19:32 - OpenVPN > C:\Windows\system32\route.exe ADD 194.187.251.154 MASK 255.255.255.255 192.168.0.1
. 2016.12.12 18:19:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.12 18:19:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.12 18:19:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.12 18:19:32 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.12 18:19:32 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.12 18:19:32 - OpenVPN > Route addition fallback to route.exe
. 2016.12.12 18:19:32 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.12 18:19:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.12 18:19:32 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.12 18:19:32 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.12 18:19:32 - OpenVPN > Route addition fallback to route.exe
. 2016.12.12 18:19:32 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.12 18:19:32 - Starting Management Interface
. 2016.12.12 18:19:32 - OpenVPN > Initialization Sequence Completed
. 2016.12.12 18:19:32 - DNS leak protection with packet filtering enabled.
. 2016.12.12 18:19:32 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.12 18:19:32 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.12 18:19:32 - Flushing DNS
I 2016.12.12 18:19:41 - Checking route
I 2016.12.12 18:19:42 - Checking DNS
! 2016.12.12 18:19:42 - Connected.
. 2016.12.12 18:19:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.12 18:19:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.12 18:23:47 - Updating systems & servers data ...
. 2016.12.12 18:23:48 - Systems & servers data update completed
. 2016.12.12 18:34:33 - Updating systems & servers data ...
. 2016.12.12 18:34:34 - Systems & servers data update completed
. 2016.12.12 18:45:05 - Updating systems & servers data ...
. 2016.12.12 18:45:05 - Systems & servers data update completed
. 2016.12.12 18:55:49 - Updating systems & servers data ...
. 2016.12.12 18:55:50 - Systems & servers data update completed
. 2016.12.12 19:06:45 - Updating systems & servers data ...
. 2016.12.12 19:06:46 - Systems & servers data update completed
. 2016.12.12 19:17:15 - Updating systems & servers data ...
. 2016.12.12 19:17:16 - Systems & servers data update completed
. 2016.12.12 19:19:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.12 19:19:25 - OpenVPN > Validating certificate key usage
. 2016.12.12 19:19:25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.12 19:19:25 - OpenVPN > VERIFY KU OK
. 2016.12.12 19:19:25 - OpenVPN > Validating certificate extended key usage
. 2016.12.12 19:19:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.12 19:19:25 - OpenVPN > VERIFY EKU OK
. 2016.12.12 19:19:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.12 19:19:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 19:19:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 19:19:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.12 19:19:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.12 19:19:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
 
I would like to hear from other Virgin Media broadband users about their experience with AirVPN. If any of you are reading this, please jump in and give me your feedback.
 
Thanks.
 
 

Share this post


Link to post

There are plenty of topics about Virgin Media/Superhub, they all refer to slow speeds, disconnects and inactivity timeouts. Try your luck with a simple search for superhub.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Thanks for the suggestions. I was wondering about the bandwidth. What speeds are you guys getting with the VPN enabled?

Share this post


Link to post

Now this is frustrating. I thought I had resolved the inactivity timeout by enabling the WAN Ping Response on my SuperHub as suggested by @cyberninja in this post. No such luck. I've had a solid connection for 7 hours straight until it timed out 8 times within the space of an hour!
 
So if my SuperHub is the cause of this drop in connection then surely my android phone (which has a solid connection for 8 hours now) would've disconnected too?

 

Here is my full log.

 
 

. 2016.12.15 02:16:03 - Systems & servers data update completed
. 2016.12.15 02:26:24 - Updating systems & servers data ...
. 2016.12.15 02:26:25 - Systems & servers data update completed
. 2016.12.15 02:37:08 - Updating systems & servers data ...
. 2016.12.15 02:37:08 - Systems & servers data update completed
. 2016.12.15 02:47:50 - Updating systems & servers data ...
. 2016.12.15 02:47:51 - Systems & servers data update completed
! 2016.12.15 02:56:48 - Disconnecting
. 2016.12.15 02:56:48 - Management - Send 'signal SIGTERM'
. 2016.12.15 02:56:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 02:56:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.15 02:56:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.117.56 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 02:56:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.15 02:56:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 02:56:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.15 02:56:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 02:56:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.15 02:56:53 - OpenVPN > Closing TUN/TAP interface
. 2016.12.15 02:56:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.15 02:56:53 - Connection terminated.
. 2016.12.15 02:56:55 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 02:56:55 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 02:56:56 - DNS leak protection with packet filtering disabled.
I 2016.12.15 02:56:56 - Checking authorization ...
! 2016.12.15 02:56:57 - Connecting to Dabih (United Kingdom, Manchester)
. 2016.12.15 02:56:58 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 02:56:58 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 02:56:58 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 02:56:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 02:56:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 02:56:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 02:56:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 02:56:58 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 02:56:58 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 02:56:58 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2016.12.15 02:56:58 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=1469a9f1 6e50ef42
. 2016.12.15 02:56:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 02:56:59 - OpenVPN > Validating certificate key usage
. 2016.12.15 02:56:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 02:56:59 - OpenVPN > VERIFY KU OK
. 2016.12.15 02:56:59 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 02:56:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 02:56:59 - OpenVPN > VERIFY EKU OK
. 2016.12.15 02:56:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 02:56:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 02:56:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 02:56:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 02:56:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 02:56:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 02:56:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2016.12.15 02:57:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 02:57:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.250 255.255.0.0'
. 2016.12.15 02:57:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 02:57:02 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 02:57:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 02:57:02 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 02:57:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 02:57:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 02:57:02 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 02:57:02 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 02:57:02 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 02:57:02 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 02:57:02 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 02:57:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.250/255.255.0.0 [sUCCEEDED]
. 2016.12.15 02:57:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.250/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 02:57:02 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 02:57:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 02:57:07 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 02:57:07 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=11]
. 2016.12.15 02:57:07 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 02:57:07 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 02:57:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 02:57:07 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 02:57:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.15 02:57:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 02:57:07 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 02:57:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.15 02:57:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 02:57:07 - Starting Management Interface
. 2016.12.15 02:57:07 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 02:57:07 - DNS leak protection with packet filtering enabled.
. 2016.12.15 02:57:07 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 02:57:07 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 02:57:07 - Flushing DNS
I 2016.12.15 02:57:17 - Checking route
I 2016.12.15 02:57:18 - Checking DNS
! 2016.12.15 02:57:19 - Connected.
. 2016.12.15 02:57:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 02:57:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 02:58:18 - Updating systems & servers data ...
. 2016.12.15 02:58:19 - Systems & servers data update completed
! 2016.12.15 03:07:42 - Disconnecting
. 2016.12.15 03:07:43 - Management - Send 'signal SIGTERM'
. 2016.12.15 03:07:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 03:07:44 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.15 03:07:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 03:07:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.15 03:07:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 03:07:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.15 03:07:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 03:07:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.15 03:07:48 - OpenVPN > Closing TUN/TAP interface
. 2016.12.15 03:07:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.15 03:07:49 - Connection terminated.
. 2016.12.15 03:07:52 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 03:07:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 03:07:52 - DNS leak protection with packet filtering disabled.
. 2016.12.15 03:07:52 - IPv6 restored with packet filtering.
! 2016.12.15 03:08:10 - Session terminated.
! 2016.12.15 03:08:22 - Deactivation of Network Lock
. 2016.12.15 03:08:38 - Updating systems & servers data ...
. 2016.12.15 03:08:39 - Systems & servers data update completed
. 2016.12.15 03:19:14 - Updating systems & servers data ...
. 2016.12.15 03:19:25 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (The operation has timed out)
. 2016.12.15 03:29:16 - Updating systems & servers data ...
. 2016.12.15 03:29:17 - Systems & servers data update completed
! 2016.12.15 03:35:30 - Activation of Network Lock - Windows Filtering Platform
I 2016.12.15 03:35:46 - Session starting.
. 2016.12.15 03:35:59 - IPv6 disabled with packet filtering.
I 2016.12.15 03:35:59 - Checking authorization ...
! 2016.12.15 03:36:00 - Connecting to Dabih (United Kingdom, Manchester)
. 2016.12.15 03:36:01 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 03:36:01 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 03:36:01 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 03:36:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 03:36:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 03:36:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 03:36:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 03:36:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 03:36:02 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 03:36:02 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2016.12.15 03:36:02 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=44a1fe4a 1cb43ce3
. 2016.12.15 03:36:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 03:36:02 - OpenVPN > Validating certificate key usage
. 2016.12.15 03:36:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 03:36:02 - OpenVPN > VERIFY KU OK
. 2016.12.15 03:36:02 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 03:36:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 03:36:02 - OpenVPN > VERIFY EKU OK
. 2016.12.15 03:36:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 03:36:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 03:36:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 03:36:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 03:36:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 03:36:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 03:36:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2016.12.15 03:36:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 03:36:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.250 255.255.0.0'
. 2016.12.15 03:36:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 03:36:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 03:36:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 03:36:04 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 03:36:04 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 03:36:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 03:36:04 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 03:36:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 03:36:04 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 03:36:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 03:36:05 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 03:36:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.250/255.255.0.0 [sUCCEEDED]
. 2016.12.15 03:36:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.250/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 03:36:05 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 03:36:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 03:36:09 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 03:36:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.12.15 03:36:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 03:36:09 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 03:36:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.15 03:36:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 03:36:09 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 03:36:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.12.15 03:36:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 03:36:09 - Starting Management Interface
. 2016.12.15 03:36:09 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 03:36:09 - DNS leak protection with packet filtering enabled.
. 2016.12.15 03:36:12 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 03:36:12 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 03:36:12 - Flushing DNS
I 2016.12.15 03:36:21 - Checking route
I 2016.12.15 03:36:22 - Checking DNS
! 2016.12.15 03:36:23 - Connected.
. 2016.12.15 03:36:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 03:36:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 03:39:53 - Updating systems & servers data ...
. 2016.12.15 03:39:53 - Systems & servers data update completed
. 2016.12.15 03:50:01 - Updating systems & servers data ...
. 2016.12.15 03:50:02 - Systems & servers data update completed
. 2016.12.15 04:00:05 - Updating systems & servers data ...
. 2016.12.15 04:00:06 - Systems & servers data update completed
. 2016.12.15 04:10:10 - Updating systems & servers data ...
. 2016.12.15 04:10:10 - Systems & servers data update completed
. 2016.12.15 04:20:15 - Updating systems & servers data ...
. 2016.12.15 04:20:15 - Systems & servers data update completed
. 2016.12.15 04:30:19 - Updating systems & servers data ...
. 2016.12.15 04:30:20 - Systems & servers data update completed
. 2016.12.15 04:36:02 - OpenVPN > TLS: soft reset sec=0 bytes=183638751/-1 pkts=194730/0
. 2016.12.15 04:36:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 04:36:02 - OpenVPN > Validating certificate key usage
. 2016.12.15 04:36:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 04:36:02 - OpenVPN > VERIFY KU OK
. 2016.12.15 04:36:02 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 04:36:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 04:36:02 - OpenVPN > VERIFY EKU OK
. 2016.12.15 04:36:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 04:36:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 04:36:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 04:36:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 04:36:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 04:36:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 04:40:25 - Updating systems & servers data ...
. 2016.12.15 04:40:25 - Systems & servers data update completed
. 2016.12.15 04:50:31 - Updating systems & servers data ...
. 2016.12.15 04:50:31 - Systems & servers data update completed
. 2016.12.15 05:00:36 - Updating systems & servers data ...
. 2016.12.15 05:00:37 - Systems & servers data update completed
. 2016.12.15 05:10:39 - Updating systems & servers data ...
. 2016.12.15 05:10:40 - Systems & servers data update completed
. 2016.12.15 05:20:46 - Updating systems & servers data ...
. 2016.12.15 05:20:46 - Systems & servers data update completed
. 2016.12.15 05:30:50 - Updating systems & servers data ...
. 2016.12.15 05:30:50 - Systems & servers data update completed
I 2016.12.15 05:36:02 - Renewing TLS key
. 2016.12.15 05:36:02 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.12.15 05:36:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 05:36:03 - OpenVPN > Validating certificate key usage
. 2016.12.15 05:36:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 05:36:03 - OpenVPN > VERIFY KU OK
. 2016.12.15 05:36:03 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 05:36:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 05:36:03 - OpenVPN > VERIFY EKU OK
. 2016.12.15 05:36:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 05:36:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 05:36:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 05:36:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 05:36:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 05:36:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 05:40:54 - Updating systems & servers data ...
. 2016.12.15 05:40:55 - Systems & servers data update completed
. 2016.12.15 05:50:59 - Updating systems & servers data ...
. 2016.12.15 05:51:00 - Systems & servers data update completed
. 2016.12.15 06:01:04 - Updating systems & servers data ...
. 2016.12.15 06:01:04 - Systems & servers data update completed
. 2016.12.15 06:11:09 - Updating systems & servers data ...
. 2016.12.15 06:11:09 - Systems & servers data update completed
. 2016.12.15 06:21:12 - Updating systems & servers data ...
. 2016.12.15 06:21:15 - Systems & servers data update completed
. 2016.12.15 06:31:18 - Updating systems & servers data ...
. 2016.12.15 06:31:19 - Systems & servers data update completed
. 2016.12.15 06:36:03 - OpenVPN > TLS: soft reset sec=0 bytes=1772605/-1 pkts=6470/0
. 2016.12.15 06:36:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 06:36:03 - OpenVPN > Validating certificate key usage
. 2016.12.15 06:36:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 06:36:03 - OpenVPN > VERIFY KU OK
. 2016.12.15 06:36:03 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 06:36:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 06:36:03 - OpenVPN > VERIFY EKU OK
. 2016.12.15 06:36:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 06:36:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 06:36:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 06:36:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 06:36:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 06:36:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 06:41:22 - Updating systems & servers data ...
. 2016.12.15 06:41:23 - Systems & servers data update completed
. 2016.12.15 06:51:27 - Updating systems & servers data ...
. 2016.12.15 06:51:27 - Systems & servers data update completed
. 2016.12.15 07:01:32 - Updating systems & servers data ...
. 2016.12.15 07:01:32 - Systems & servers data update completed
. 2016.12.15 07:11:38 - Updating systems & servers data ...
. 2016.12.15 07:11:38 - Systems & servers data update completed
. 2016.12.15 07:21:42 - Updating systems & servers data ...
. 2016.12.15 07:21:43 - Systems & servers data update completed
. 2016.12.15 07:31:47 - Updating systems & servers data ...
. 2016.12.15 07:31:48 - Systems & servers data update completed
. 2016.12.15 07:36:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 07:36:04 - OpenVPN > Validating certificate key usage
. 2016.12.15 07:36:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 07:36:04 - OpenVPN > VERIFY KU OK
. 2016.12.15 07:36:04 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 07:36:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 07:36:04 - OpenVPN > VERIFY EKU OK
. 2016.12.15 07:36:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 07:36:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 07:36:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 07:36:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 07:36:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 07:36:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 07:41:51 - Updating systems & servers data ...
. 2016.12.15 07:41:51 - Systems & servers data update completed
. 2016.12.15 07:51:55 - Updating systems & servers data ...
. 2016.12.15 07:51:55 - Systems & servers data update completed
. 2016.12.15 08:01:59 - Updating systems & servers data ...
. 2016.12.15 08:02:00 - Systems & servers data update completed
. 2016.12.15 08:12:04 - Updating systems & servers data ...
. 2016.12.15 08:12:04 - Systems & servers data update completed
. 2016.12.15 08:22:07 - Updating systems & servers data ...
. 2016.12.15 08:22:08 - Systems & servers data update completed
. 2016.12.15 08:32:12 - Updating systems & servers data ...
. 2016.12.15 08:32:12 - Systems & servers data update completed
I 2016.12.15 08:36:03 - Renewing TLS key
. 2016.12.15 08:36:03 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.12.15 08:36:04 - OpenVPN > TLS: soft reset sec=0 bytes=1654237/-1 pkts=6451/0
. 2016.12.15 08:36:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 08:36:04 - OpenVPN > Validating certificate key usage
. 2016.12.15 08:36:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 08:36:04 - OpenVPN > VERIFY KU OK
. 2016.12.15 08:36:04 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 08:36:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 08:36:04 - OpenVPN > VERIFY EKU OK
. 2016.12.15 08:36:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 08:36:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 08:36:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 08:36:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 08:36:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 08:36:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 08:42:16 - Updating systems & servers data ...
. 2016.12.15 08:42:16 - Systems & servers data update completed
. 2016.12.15 08:52:20 - Updating systems & servers data ...
. 2016.12.15 08:52:21 - Systems & servers data update completed
. 2016.12.15 09:02:24 - Updating systems & servers data ...
. 2016.12.15 09:02:25 - Systems & servers data update completed
. 2016.12.15 09:12:31 - Updating systems & servers data ...
. 2016.12.15 09:12:31 - Systems & servers data update completed
. 2016.12.15 09:22:35 - Updating systems & servers data ...
. 2016.12.15 09:22:35 - Systems & servers data update completed
. 2016.12.15 09:32:38 - Updating systems & servers data ...
. 2016.12.15 09:32:38 - Systems & servers data update completed
. 2016.12.15 09:36:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 09:36:04 - OpenVPN > Validating certificate key usage
. 2016.12.15 09:36:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 09:36:04 - OpenVPN > VERIFY KU OK
. 2016.12.15 09:36:04 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 09:36:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 09:36:04 - OpenVPN > VERIFY EKU OK
. 2016.12.15 09:36:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 09:36:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 09:36:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 09:36:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 09:36:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 09:36:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 09:42:41 - Updating systems & servers data ...
. 2016.12.15 09:42:42 - Systems & servers data update completed
. 2016.12.15 09:52:45 - Updating systems & servers data ...
. 2016.12.15 09:52:45 - Systems & servers data update completed
. 2016.12.15 10:02:49 - Updating systems & servers data ...
. 2016.12.15 10:02:49 - Systems & servers data update completed
. 2016.12.15 10:12:55 - Updating systems & servers data ...
. 2016.12.15 10:12:55 - Systems & servers data update completed
. 2016.12.15 10:23:01 - Updating systems & servers data ...
. 2016.12.15 10:23:01 - Systems & servers data update completed
. 2016.12.15 10:33:07 - Updating systems & servers data ...
. 2016.12.15 10:33:08 - Systems & servers data update completed
. 2016.12.15 10:36:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 10:36:04 - OpenVPN > Validating certificate key usage
. 2016.12.15 10:36:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 10:36:04 - OpenVPN > VERIFY KU OK
. 2016.12.15 10:36:04 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 10:36:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 10:36:04 - OpenVPN > VERIFY EKU OK
. 2016.12.15 10:36:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 10:36:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 10:36:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 10:36:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 10:36:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 10:36:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 10:43:28 - Updating systems & servers data ...
. 2016.12.15 10:43:28 - Systems & servers data update completed
. 2016.12.15 10:54:10 - Updating systems & servers data ...
. 2016.12.15 10:54:11 - Systems & servers data update completed
. 2016.12.15 11:04:17 - Updating systems & servers data ...
. 2016.12.15 11:04:18 - Systems & servers data update completed
. 2016.12.15 11:14:21 - Updating systems & servers data ...
. 2016.12.15 11:14:23 - Systems & servers data update completed
. 2016.12.15 11:24:29 - Updating systems & servers data ...
. 2016.12.15 11:24:30 - Systems & servers data update completed
. 2016.12.15 11:35:27 - Updating systems & servers data ...
. 2016.12.15 11:35:29 - Systems & servers data update completed
I 2016.12.15 11:36:05 - Renewing TLS key
. 2016.12.15 11:36:06 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.12.15 11:36:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 11:36:06 - OpenVPN > Validating certificate key usage
. 2016.12.15 11:36:06 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 11:36:06 - OpenVPN > VERIFY KU OK
. 2016.12.15 11:36:06 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 11:36:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 11:36:06 - OpenVPN > VERIFY EKU OK
. 2016.12.15 11:36:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 11:36:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 11:36:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 11:36:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 11:36:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 11:36:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 11:46:22 - Updating systems & servers data ...
. 2016.12.15 11:46:23 - Systems & servers data update completed
. 2016.12.15 11:51:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 11:51:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 11:51:36 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 11:51:37 - Disconnecting
. 2016.12.15 11:51:37 - Management - Send 'signal SIGTERM'
. 2016.12.15 11:51:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 11:51:37 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 11:51:37 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 11:51:37 - OpenVPN > Exiting due to fatal error
. 2016.12.15 11:51:37 - Connection terminated.
. 2016.12.15 11:51:44 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 11:51:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 11:51:45 - DNS leak protection with packet filtering disabled.
I 2016.12.15 11:51:54 - Checking authorization ...
! 2016.12.15 11:51:55 - Connecting to Asterope (United Kingdom, Manchester)
. 2016.12.15 11:51:56 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 11:51:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 11:51:56 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 11:51:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 11:51:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 11:51:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 11:51:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 11:51:56 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 11:51:56 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 11:51:56 - OpenVPN > UDPv4 link remote: [AF_INET]89.249.74.212:443
. 2016.12.15 11:51:56 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=a2dbe8e8 93741c2e
. 2016.12.15 11:51:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 11:51:56 - OpenVPN > Validating certificate key usage
. 2016.12.15 11:51:56 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 11:51:56 - OpenVPN > VERIFY KU OK
. 2016.12.15 11:51:56 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 11:51:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 11:51:56 - OpenVPN > VERIFY EKU OK
. 2016.12.15 11:51:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 11:51:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 11:51:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 11:51:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 11:51:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 11:51:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 11:51:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443
. 2016.12.15 11:51:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 11:51:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.10.112 255.255.0.0'
. 2016.12.15 11:51:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 11:51:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 11:51:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 11:51:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 11:51:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 11:51:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 11:51:59 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 11:51:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 11:51:59 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 11:52:03 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 11:52:03 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 11:52:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.10.112/255.255.0.0 [sUCCEEDED]
. 2016.12.15 11:52:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.10.112/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 11:52:03 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 11:52:03 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065)
. 2016.12.15 11:52:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 11:52:04 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 11:52:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.15 11:52:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 11:52:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 11:52:04 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 11:52:04 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 11:52:04 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 11:52:04 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 11:52:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 11:52:04 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 11:52:04 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 11:52:04 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 11:52:04 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 11:52:04 - Starting Management Interface
. 2016.12.15 11:52:04 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 11:52:04 - DNS leak protection with packet filtering enabled.
. 2016.12.15 11:52:04 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 11:52:04 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 11:52:04 - Flushing DNS
I 2016.12.15 11:52:14 - Checking route
I 2016.12.15 11:52:15 - Checking DNS
! 2016.12.15 11:52:16 - Connected.
. 2016.12.15 11:52:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 11:52:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 11:56:27 - Updating systems & servers data ...
. 2016.12.15 11:56:28 - Systems & servers data update completed
. 2016.12.15 12:04:53 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 12:04:53 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 12:04:53 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 12:04:53 - Disconnecting
. 2016.12.15 12:04:53 - Management - Send 'signal SIGTERM'
. 2016.12.15 12:04:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 12:04:53 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 12:04:53 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 12:04:53 - OpenVPN > Exiting due to fatal error
. 2016.12.15 12:04:53 - Connection terminated.
. 2016.12.15 12:04:54 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 12:04:54 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 12:04:54 - DNS leak protection with packet filtering disabled.
I 2016.12.15 12:04:57 - Checking authorization ...
! 2016.12.15 12:04:57 - Connecting to Alshain (United Kingdom, London)
. 2016.12.15 12:04:57 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 12:04:57 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 12:04:57 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 12:04:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 12:04:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 12:04:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:04:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:04:58 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 12:04:58 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 12:04:58 - OpenVPN > UDPv4 link remote: [AF_INET]217.151.98.162:443
. 2016.12.15 12:04:58 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.162:443, sid=7c3f6bef 0c10e28b
. 2016.12.15 12:04:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 12:04:58 - OpenVPN > Validating certificate key usage
. 2016.12.15 12:04:58 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 12:04:58 - OpenVPN > VERIFY KU OK
. 2016.12.15 12:04:58 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 12:04:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 12:04:58 - OpenVPN > VERIFY EKU OK
. 2016.12.15 12:04:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 12:04:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:04:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:04:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:04:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:04:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 12:04:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.162:443
. 2016.12.15 12:05:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 12:05:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.181 255.255.0.0'
. 2016.12.15 12:05:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 12:05:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 12:05:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 12:05:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 12:05:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 12:05:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 12:05:01 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 12:05:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 12:05:01 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 12:05:01 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 12:05:01 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 12:05:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.181/255.255.0.0 [sUCCEEDED]
. 2016.12.15 12:05:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.181/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 12:05:01 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 12:05:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 12:05:06 - OpenVPN > C:\Windows\system32\route.exe ADD 217.151.98.162 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 12:05:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.15 12:05:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 12:05:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:05:06 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:05:06 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:05:06 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:05:06 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:05:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:05:06 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:05:06 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:05:06 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:05:06 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:05:06 - Starting Management Interface
. 2016.12.15 12:05:06 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 12:05:06 - DNS leak protection with packet filtering enabled.
. 2016.12.15 12:05:06 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 12:05:06 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 12:05:06 - Flushing DNS
I 2016.12.15 12:05:15 - Checking route
I 2016.12.15 12:05:15 - Checking DNS
! 2016.12.15 12:05:16 - Connected.
. 2016.12.15 12:05:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 12:05:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 12:06:56 - Updating systems & servers data ...
. 2016.12.15 12:06:56 - Systems & servers data update completed
. 2016.12.15 12:17:21 - Updating systems & servers data ...
. 2016.12.15 12:17:21 - Systems & servers data update completed
. 2016.12.15 12:27:59 - Updating systems & servers data ...
. 2016.12.15 12:27:59 - Systems & servers data update completed
. 2016.12.15 12:38:32 - Updating systems & servers data ...
. 2016.12.15 12:38:32 - Systems & servers data update completed
. 2016.12.15 12:41:18 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 12:41:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 12:41:18 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 12:41:18 - Disconnecting
. 2016.12.15 12:41:18 - Management - Send 'signal SIGTERM'
. 2016.12.15 12:41:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 12:41:19 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 12:41:19 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 12:41:19 - OpenVPN > Exiting due to fatal error
. 2016.12.15 12:41:19 - Connection terminated.
. 2016.12.15 12:41:20 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 12:41:20 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 12:41:20 - DNS leak protection with packet filtering disabled.
I 2016.12.15 12:41:28 - Checking authorization ...
! 2016.12.15 12:41:28 - Connecting to Dabih (United Kingdom, Manchester)
. 2016.12.15 12:41:29 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 12:41:29 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 12:41:29 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 12:41:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 12:41:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 12:41:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:41:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:41:29 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 12:41:29 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 12:41:29 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2016.12.15 12:41:29 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=7fd7019c c41d7c8b
. 2016.12.15 12:41:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 12:41:29 - OpenVPN > Validating certificate key usage
. 2016.12.15 12:41:29 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 12:41:29 - OpenVPN > VERIFY KU OK
. 2016.12.15 12:41:29 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 12:41:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 12:41:29 - OpenVPN > VERIFY EKU OK
. 2016.12.15 12:41:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 12:41:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:41:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:41:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:41:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:41:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 12:41:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2016.12.15 12:41:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 12:41:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.250 255.255.0.0'
. 2016.12.15 12:41:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 12:41:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 12:41:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 12:41:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 12:41:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 12:41:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 12:41:31 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 12:41:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 12:41:31 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 12:41:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 12:41:32 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 12:41:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.250/255.255.0.0 [sUCCEEDED]
. 2016.12.15 12:41:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.250/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 12:41:32 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 12:41:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 12:41:36 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 12:41:36 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=11]
. 2016.12.15 12:41:36 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:41:36 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:41:36 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:41:36 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:41:36 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:41:36 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:41:36 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:41:36 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:41:36 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:41:36 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:41:36 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:41:36 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:41:36 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:41:36 - Starting Management Interface
. 2016.12.15 12:41:36 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 12:41:36 - DNS leak protection with packet filtering enabled.
. 2016.12.15 12:41:36 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 12:41:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 12:41:36 - Flushing DNS
I 2016.12.15 12:41:49 - Checking route
I 2016.12.15 12:41:49 - Checking DNS
! 2016.12.15 12:41:49 - Connected.
. 2016.12.15 12:41:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 12:41:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 12:44:06 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 12:44:06 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 12:44:06 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 12:44:06 - Disconnecting
. 2016.12.15 12:44:06 - Management - Send 'signal SIGTERM'
. 2016.12.15 12:44:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 12:44:06 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 12:44:06 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 12:44:06 - OpenVPN > Exiting due to fatal error
. 2016.12.15 12:44:06 - Connection terminated.
. 2016.12.15 12:44:06 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 12:44:06 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 12:44:06 - DNS leak protection with packet filtering disabled.
I 2016.12.15 12:44:09 - Checking authorization ...
! 2016.12.15 12:44:10 - Connecting to Naos (United Kingdom, Manchester)
. 2016.12.15 12:44:10 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 12:44:10 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 12:44:10 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 12:44:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 12:44:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 12:44:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:44:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:44:10 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 12:44:10 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 12:44:10 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.117.56:443
. 2016.12.15 12:44:10 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.117.56:443, sid=a8a1aec3 9c9e9e16
. 2016.12.15 12:44:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 12:44:10 - OpenVPN > Validating certificate key usage
. 2016.12.15 12:44:10 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 12:44:10 - OpenVPN > VERIFY KU OK
. 2016.12.15 12:44:10 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 12:44:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 12:44:10 - OpenVPN > VERIFY EKU OK
. 2016.12.15 12:44:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 12:44:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:44:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:44:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:44:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:44:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 12:44:11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.117.56:443
. 2016.12.15 12:44:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 12:44:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.44.221 255.255.0.0'
. 2016.12.15 12:44:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 12:44:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 12:44:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 12:44:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 12:44:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 12:44:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 12:44:14 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 12:44:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 12:44:14 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 12:44:14 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 12:44:14 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 12:44:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.44.221/255.255.0.0 [sUCCEEDED]
. 2016.12.15 12:44:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.44.221/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 12:44:14 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 12:44:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 12:44:18 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.117.56 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 12:44:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.15 12:44:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 12:44:18 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:44:18 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:44:18 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:44:18 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:44:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:44:18 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:44:18 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:44:18 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:44:18 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:44:18 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:44:18 - Starting Management Interface
. 2016.12.15 12:44:18 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 12:44:18 - DNS leak protection with packet filtering enabled.
. 2016.12.15 12:44:19 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 12:44:19 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 12:44:19 - Flushing DNS
I 2016.12.15 12:44:28 - Checking route
I 2016.12.15 12:44:28 - Checking DNS
! 2016.12.15 12:44:28 - Connected.
. 2016.12.15 12:44:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 12:44:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 12:46:58 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 12:46:58 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 12:46:58 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 12:46:58 - Disconnecting
. 2016.12.15 12:46:58 - Management - Send 'signal SIGTERM'
. 2016.12.15 12:46:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 12:46:58 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 12:46:58 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 12:46:58 - OpenVPN > Exiting due to fatal error
. 2016.12.15 12:46:58 - Connection terminated.
. 2016.12.15 12:46:59 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 12:46:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 12:47:00 - DNS leak protection with packet filtering disabled.
I 2016.12.15 12:47:03 - Checking authorization ...
! 2016.12.15 12:47:04 - Connecting to Denebola (United Kingdom, Maidenhead)
. 2016.12.15 12:47:04 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 12:47:04 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 12:47:04 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 12:47:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 12:47:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 12:47:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:47:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:47:04 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 12:47:04 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 12:47:04 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.133:443
. 2016.12.15 12:47:04 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.133:443, sid=e3bb302a 7c958aa3
. 2016.12.15 12:47:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 12:47:04 - OpenVPN > Validating certificate key usage
. 2016.12.15 12:47:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 12:47:04 - OpenVPN > VERIFY KU OK
. 2016.12.15 12:47:04 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 12:47:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 12:47:04 - OpenVPN > VERIFY EKU OK
. 2016.12.15 12:47:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 12:47:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:47:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:47:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:47:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:47:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 12:47:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.133:443
. 2016.12.15 12:47:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 12:47:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.26.43 255.255.0.0'
. 2016.12.15 12:47:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 12:47:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 12:47:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 12:47:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 12:47:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 12:47:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 12:47:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 12:47:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 12:47:07 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 12:47:07 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 12:47:07 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 12:47:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.26.43/255.255.0.0 [sUCCEEDED]
. 2016.12.15 12:47:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.26.43/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 12:47:07 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 12:47:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 12:47:12 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.133 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 12:47:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.15 12:47:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 12:47:12 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:47:12 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:47:12 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:47:12 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:47:12 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:47:12 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:47:12 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:47:12 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:47:12 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:47:12 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:47:12 - Starting Management Interface
. 2016.12.15 12:47:12 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 12:47:12 - DNS leak protection with packet filtering enabled.
. 2016.12.15 12:47:12 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 12:47:12 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 12:47:14 - Flushing DNS
I 2016.12.15 12:47:23 - Checking route
I 2016.12.15 12:47:23 - Checking DNS
! 2016.12.15 12:47:23 - Connected.
. 2016.12.15 12:47:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 12:47:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 12:49:29 - Updating systems & servers data ...
. 2016.12.15 12:49:29 - Systems & servers data update completed
. 2016.12.15 12:50:59 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 12:50:59 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 12:50:59 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 12:50:59 - Disconnecting
. 2016.12.15 12:50:59 - Management - Send 'signal SIGTERM'
. 2016.12.15 12:50:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 12:50:59 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 12:50:59 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 12:50:59 - OpenVPN > Exiting due to fatal error
. 2016.12.15 12:50:59 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.12.15 12:50:59 - OpenVpn Management > >FATAL:Assertion failed at misc.c:785 (es)
. 2016.12.15 12:50:59 - Connection terminated.
. 2016.12.15 12:51:00 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 12:51:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 12:51:00 - DNS leak protection with packet filtering disabled.
I 2016.12.15 12:51:03 - Checking authorization ...
! 2016.12.15 12:51:04 - Connecting to Asterope (United Kingdom, Manchester)
. 2016.12.15 12:51:04 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 12:51:04 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 12:51:04 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 12:51:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 12:51:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 12:51:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:51:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:51:05 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 12:51:05 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 12:51:05 - OpenVPN > UDPv4 link remote: [AF_INET]89.249.74.212:443
. 2016.12.15 12:51:05 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=b620cf91 c72b7256
. 2016.12.15 12:51:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 12:51:05 - OpenVPN > Validating certificate key usage
. 2016.12.15 12:51:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 12:51:05 - OpenVPN > VERIFY KU OK
. 2016.12.15 12:51:05 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 12:51:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 12:51:05 - OpenVPN > VERIFY EKU OK
. 2016.12.15 12:51:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 12:51:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:51:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:51:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:51:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:51:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 12:51:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443
. 2016.12.15 12:51:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 12:51:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.10.112 255.255.0.0'
. 2016.12.15 12:51:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 12:51:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 12:51:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 12:51:07 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 12:51:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 12:51:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 12:51:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 12:51:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 12:51:08 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 12:51:08 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 12:51:08 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 12:51:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.10.112/255.255.0.0 [sUCCEEDED]
. 2016.12.15 12:51:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.10.112/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 12:51:08 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 12:51:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 12:51:13 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 12:51:13 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=11]
. 2016.12.15 12:51:13 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:51:13 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:51:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:51:13 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:51:13 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:51:13 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:51:13 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:51:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:51:13 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:51:13 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:51:13 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:51:13 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:51:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:51:13 - Starting Management Interface
. 2016.12.15 12:51:13 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 12:51:13 - DNS leak protection with packet filtering enabled.
. 2016.12.15 12:51:13 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 12:51:13 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 12:51:14 - Flushing DNS
I 2016.12.15 12:51:23 - Checking route
I 2016.12.15 12:51:23 - Checking DNS
! 2016.12.15 12:51:23 - Connected.
. 2016.12.15 12:51:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 12:51:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 12:53:48 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 12:53:48 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 12:53:48 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 12:53:48 - Disconnecting
. 2016.12.15 12:53:48 - Management - Send 'signal SIGTERM'
. 2016.12.15 12:53:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 12:53:48 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 12:53:48 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.12.15 12:53:48 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 12:53:48 - OpenVpn Management > >FATAL:Assertion failed at misc.c:785 (es)
. 2016.12.15 12:53:48 - OpenVPN > Exiting due to fatal error
. 2016.12.15 12:53:48 - Connection terminated.
. 2016.12.15 12:53:49 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 12:53:49 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 12:53:49 - DNS leak protection with packet filtering disabled.
I 2016.12.15 12:53:52 - Checking authorization ...
! 2016.12.15 12:53:52 - Connecting to Elnath (Netherlands, Alblasserdam)
. 2016.12.15 12:53:52 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2016.12.15 12:53:52 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2016.12.15 12:53:52 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2016.12.15 12:53:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.15 12:53:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.15 12:53:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:53:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:53:53 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2016.12.15 12:53:53 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.15 12:53:53 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.180.4:443
. 2016.12.15 12:53:53 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.180.4:443, sid=fe70209b fd10f947
. 2016.12.15 12:53:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.15 12:53:53 - OpenVPN > Validating certificate key usage
. 2016.12.15 12:53:53 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.15 12:53:53 - OpenVPN > VERIFY KU OK
. 2016.12.15 12:53:53 - OpenVPN > Validating certificate extended key usage
. 2016.12.15 12:53:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.15 12:53:53 - OpenVPN > VERIFY EKU OK
. 2016.12.15 12:53:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.15 12:53:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:53:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:53:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.15 12:53:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.15 12:53:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.15 12:53:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.180.4:443
. 2016.12.15 12:53:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.15 12:53:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.91.37 255.255.0.0'
. 2016.12.15 12:53:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.15 12:53:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.15 12:53:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.15 12:53:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.15 12:53:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.15 12:53:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.15 12:53:55 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=00:22:fa:5a:74:fe
. 2016.12.15 12:53:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.15 12:53:55 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.15 12:53:56 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{944911AE-3955-43BD-B52C-8709DD17B0EF}.tap
. 2016.12.15 12:53:56 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.12.15 12:53:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.91.37/255.255.0.0 [sUCCEEDED]
. 2016.12.15 12:53:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.91.37/255.255.0.0 on interface {944911AE-3955-43BD-B52C-8709DD17B0EF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.15 12:53:56 - OpenVPN > Successful ARP Flush on interface [17] {944911AE-3955-43BD-B52C-8709DD17B0EF}
. 2016.12.15 12:54:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.15 12:54:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.180.4 MASK 255.255.255.255 192.168.0.1
. 2016.12.15 12:54:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.12.15 12:54:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.15 12:54:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:54:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:54:00 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:54:00 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:54:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:54:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.15 12:54:00 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=17]
. 2016.12.15 12:54:00 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.15 12:54:00 - OpenVPN > Route addition fallback to route.exe
. 2016.12.15 12:54:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2016.12.15 12:54:00 - Starting Management Interface
. 2016.12.15 12:54:00 - OpenVPN > Initialization Sequence Completed
. 2016.12.15 12:54:00 - DNS leak protection with packet filtering enabled.
. 2016.12.15 12:54:00 - DNS of a network adapter forced (Intel® WiFi Link 5100 AGN, from automatic (192.168.0.1) to 10.4.0.1)
. 2016.12.15 12:54:00 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
I 2016.12.15 12:54:00 - Flushing DNS
I 2016.12.15 12:54:09 - Checking route
I 2016.12.15 12:54:09 - Checking DNS
! 2016.12.15 12:54:09 - Connected.
. 2016.12.15 12:54:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.15 12:54:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.15 12:59:32 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.15 12:59:32 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.15 12:59:32 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.15 12:59:32 - Disconnecting
. 2016.12.15 12:59:32 - Management - Send 'signal SIGTERM'
. 2016.12.15 12:59:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.15 12:59:32 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.15 12:59:32 - OpenVPN > Assertion failed at misc.c:785 (es)
. 2016.12.15 12:59:32 - OpenVPN > Exiting due to fatal error
. 2016.12.15 12:59:32 - Connection terminated.
. 2016.12.15 12:59:32 - DNS of a network adapter restored to original settings (Intel® WiFi Link 5100 AGN, to automatic)
. 2016.12.15 12:59:32 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2016.12.15 12:59:32 - DNS leak protection with packet filtering disabled.
. 2016.12.15 12:59:40 - IPv6 restored with packet filtering.
. 2016.12.15 12:59:40 - Updating systems & servers data ...
. 2016.12.15 12:59:41 - Systems & servers data update completed
! 2016.12.15 12:59:51 - Session terminated.
 
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...