Jump to content
Not connected, Your IP: 18.227.46.87
nouk2016

Connection being dropped and crazy upload speeds

Recommended Posts

Logs won't show much IMO but someone will ask for them.

 

I 2016.12.18 11:20:25 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.12.18 11:20:25 - Reading options from C:\Users\alchemist\AppData\Local\AirVPN\AirVPN.xml
. 2016.12.18 11:20:26 - Data Path: C:\Users\alchemist\AppData\Local\AirVPN
. 2016.12.18 11:20:26 - App Path: C:\Program Files\AirVPN
. 2016.12.18 11:20:26 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.18 11:20:26 - Command line arguments (1): path="home"
. 2016.12.18 11:20:26 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.12.18 11:20:26 - Updating systems & servers data ...
I 2016.12.18 11:20:27 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.12.18 11:20:27 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.18 11:20:27 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.18 11:20:27 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
W 2016.12.18 11:20:27 - Recovery. Unexpected crash?
I 2016.12.18 11:20:27 - DNS of a network adapter restored to original settings (Dell Wireless 1820A 802.11ac)
I 2016.12.18 11:20:27 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
! 2016.12.18 11:20:27 - Deactivation of Network Lock
! 2016.12.18 11:20:29 - Activation of Network Lock - Windows Firewall
I 2016.12.18 11:20:31 - Session starting.
. 2016.12.18 11:20:32 - Systems & servers data update completed
I 2016.12.18 11:20:40 - Checking authorization ...
! 2016.12.18 11:20:40 - Connecting to Talitha (Netherlands, Alblasserdam)
. 2016.12.18 11:20:40 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.18 11:20:40 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.18 11:20:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.18 11:20:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.18 11:20:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 11:20:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 11:20:40 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.18 11:20:40 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.18 11:20:40 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.137:443
. 2016.12.18 11:20:40 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.137:443, sid=863d1416 e7653360
. 2016.12.18 11:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 11:20:41 - OpenVPN > Validating certificate key usage
. 2016.12.18 11:20:41 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 11:20:41 - OpenVPN > VERIFY KU OK
. 2016.12.18 11:20:41 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 11:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 11:20:41 - OpenVPN > VERIFY EKU OK
. 2016.12.18 11:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 11:20:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 11:20:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 11:20:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 11:20:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 11:20:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 11:20:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.137:443
. 2016.12.18 11:20:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.18 11:20:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.92.155 255.255.0.0'
. 2016.12.18 11:20:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.18 11:20:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.18 11:20:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.18 11:20:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.18 11:20:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.18 11:20:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.18 11:20:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.18 11:20:46 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.18 11:20:46 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}.tap
. 2016.12.18 11:20:46 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.18 11:20:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.92.155/255.255.0.0 [sUCCEEDED]
. 2016.12.18 11:20:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.92.155/255.255.0.0 on interface {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.18 11:20:46 - OpenVPN > Successful ARP Flush on interface [12] {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}
. 2016.12.18 11:20:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.18 11:20:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.137 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 11:20:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2016.12.18 11:20:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 11:20:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 10
. 2016.12.18 11:20:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2016.12.18 11:20:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 11:20:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 11:20:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 11:20:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 11:20:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 11:20:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 11:20:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 11:20:51 - Starting Management Interface
. 2016.12.18 11:20:51 - OpenVPN > Initialization Sequence Completed
I 2016.12.18 11:20:51 - DNS of a network adapter forced (Dell Wireless 1820A 802.11ac)
I 2016.12.18 11:20:51 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.18 11:20:51 - Flushing DNS
I 2016.12.18 11:20:52 - Checking route
I 2016.12.18 11:20:52 - Checking DNS
! 2016.12.18 11:21:04 - Connected.
. 2016.12.18 11:21:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.18 11:21:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.18 11:50:47 - Updating systems & servers data ...
. 2016.12.18 11:50:47 - Systems & servers data update completed
. 2016.12.18 12:20:43 - OpenVPN > TLS: soft reset sec=0 bytes=35297761/0 pkts=54312/0
. 2016.12.18 12:20:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 12:20:44 - OpenVPN > Validating certificate key usage
. 2016.12.18 12:20:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 12:20:44 - OpenVPN > VERIFY KU OK
. 2016.12.18 12:20:44 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 12:20:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 12:20:44 - OpenVPN > VERIFY EKU OK
. 2016.12.18 12:20:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 12:20:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 12:20:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 12:20:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 12:20:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 12:20:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 12:21:45 - Updating systems & servers data ...
. 2016.12.18 12:21:46 - Systems & servers data update completed
. 2016.12.18 12:52:12 - Updating systems & servers data ...
. 2016.12.18 12:52:13 - Systems & servers data update completed
I 2016.12.18 13:20:43 - Renewing TLS key
. 2016.12.18 13:20:43 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.12.18 13:20:46 - OpenVPN > TLS: soft reset sec=0 bytes=922290658/0 pkts=1329840/0
. 2016.12.18 13:20:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 13:20:46 - OpenVPN > Validating certificate key usage
. 2016.12.18 13:20:46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 13:20:46 - OpenVPN > VERIFY KU OK
. 2016.12.18 13:20:46 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 13:20:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 13:20:46 - OpenVPN > VERIFY EKU OK
. 2016.12.18 13:20:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 13:20:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 13:20:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 13:20:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 13:20:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 13:20:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 13:22:26 - Updating systems & servers data ...
. 2016.12.18 13:22:30 - Systems & servers data update completed
. 2016.12.18 13:47:57 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.12.18 13:47:57 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.12.18 13:47:57 - OpenVPN > Restart pause, 2 second(s)
! 2016.12.18 13:47:57 - Disconnecting
. 2016.12.18 13:47:57 - Management - Send 'signal SIGTERM'
. 2016.12.18 13:47:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.18 13:47:57 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.18 13:47:57 - OpenVPN > Assertion failed at misc.c:779
. 2016.12.18 13:47:57 - OpenVPN > Exiting due to fatal error
. 2016.12.18 13:47:57 - Connection terminated.
I 2016.12.18 13:47:57 - DNS of a network adapter restored to original settings (Dell Wireless 1820A 802.11ac)
I 2016.12.18 13:47:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.18 13:48:09 - Checking authorization ...
! 2016.12.18 13:48:09 - Connecting to Diphda (Netherlands, Alblasserdam)
. 2016.12.18 13:48:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.18 13:48:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.18 13:48:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.18 13:48:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.18 13:48:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 13:48:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 13:48:09 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.18 13:48:09 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.18 13:48:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443
. 2016.12.18 13:48:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=94f4e605 3aa1e7fd
. 2016.12.18 13:48:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 13:48:09 - OpenVPN > Validating certificate key usage
. 2016.12.18 13:48:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 13:48:09 - OpenVPN > VERIFY KU OK
. 2016.12.18 13:48:09 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 13:48:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 13:48:09 - OpenVPN > VERIFY EKU OK
. 2016.12.18 13:48:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 13:48:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 13:48:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 13:48:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 13:48:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 13:48:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 13:48:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443
. 2016.12.18 13:48:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.18 13:48:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.92.3 255.255.0.0'
. 2016.12.18 13:48:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.18 13:48:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.18 13:48:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.18 13:48:18 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.18 13:48:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.18 13:48:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.18 13:48:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.18 13:48:18 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.18 13:48:18 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}.tap
. 2016.12.18 13:48:18 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.18 13:48:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.92.3/255.255.0.0 [sUCCEEDED]
. 2016.12.18 13:48:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.92.3/255.255.0.0 on interface {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.18 13:48:18 - OpenVPN > Successful ARP Flush on interface [12] {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}
. 2016.12.18 13:48:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.18 13:48:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.164 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 13:48:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2016.12.18 13:48:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 13:48:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 10
. 2016.12.18 13:48:23 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=10]
. 2016.12.18 13:48:23 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.18 13:48:23 - OpenVPN > Route addition fallback to route.exe
. 2016.12.18 13:48:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.18 13:48:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 13:48:23 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.12.18 13:48:23 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.18 13:48:23 - OpenVPN > Route addition fallback to route.exe
. 2016.12.18 13:48:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.18 13:48:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 13:48:23 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.12.18 13:48:23 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.18 13:48:23 - OpenVPN > Route addition fallback to route.exe
. 2016.12.18 13:48:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.18 13:48:23 - Starting Management Interface
. 2016.12.18 13:48:23 - OpenVPN > Initialization Sequence Completed
I 2016.12.18 13:48:23 - DNS of a network adapter forced (Dell Wireless 1820A 802.11ac)
I 2016.12.18 13:48:23 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.18 13:48:23 - Flushing DNS
I 2016.12.18 13:48:23 - Checking route
W 2016.12.18 13:48:41 - Checking info, 1° try failed (The operation has timed out)
I 2016.12.18 13:48:41 - Checking DNS
! 2016.12.18 13:48:54 - Connected.
. 2016.12.18 13:48:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.18 13:48:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.18 13:52:54 - Updating systems & servers data ...
. 2016.12.18 13:52:54 - Systems & servers data update completed
! 2016.12.18 14:18:24 - Disconnecting
. 2016.12.18 14:18:24 - Management - Send 'signal SIGTERM'
. 2016.12.18 14:18:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.18 14:18:24 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.18 14:18:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.164 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 14:18:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 14:18:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:18:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:18:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:29 - OpenVPN > Closing TUN/TAP interface
. 2016.12.18 14:18:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.18 14:18:30 - Connection terminated.
I 2016.12.18 14:18:30 - DNS of a network adapter restored to original settings (Dell Wireless 1820A 802.11ac)
I 2016.12.18 14:18:30 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
! 2016.12.18 14:18:30 - Session terminated.
I 2016.12.18 14:18:32 - Session starting.
I 2016.12.18 14:18:35 - Checking authorization ...
! 2016.12.18 14:18:35 - Connecting to Alphirk (Netherlands, Alblasserdam)
. 2016.12.18 14:18:36 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.18 14:18:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.18 14:18:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.18 14:18:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.18 14:18:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:18:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:18:36 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.18 14:18:36 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.18 14:18:36 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.146:443
. 2016.12.18 14:18:36 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.146:443, sid=38473fd2 5b8caa53
. 2016.12.18 14:18:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 14:18:36 - OpenVPN > Validating certificate key usage
. 2016.12.18 14:18:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 14:18:36 - OpenVPN > VERIFY KU OK
. 2016.12.18 14:18:36 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 14:18:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 14:18:36 - OpenVPN > VERIFY EKU OK
. 2016.12.18 14:18:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 14:18:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 14:18:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:18:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 14:18:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:18:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 14:18:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.146:443
. 2016.12.18 14:18:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.18 14:18:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.189 255.255.0.0'
. 2016.12.18 14:18:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.18 14:18:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.18 14:18:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.18 14:18:41 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.18 14:18:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.18 14:18:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.18 14:18:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.18 14:18:41 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.18 14:18:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}.tap
. 2016.12.18 14:18:41 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.18 14:18:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.189/255.255.0.0 [sUCCEEDED]
. 2016.12.18 14:18:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.189/255.255.0.0 on interface {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.18 14:18:41 - OpenVPN > Successful ARP Flush on interface [12] {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}
. 2016.12.18 14:18:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.18 14:18:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.146 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 14:18:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2016.12.18 14:18:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 10
. 2016.12.18 14:18:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2016.12.18 14:18:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:18:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 14:18:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:18:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 14:18:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:18:46 - Starting Management Interface
. 2016.12.18 14:18:46 - OpenVPN > Initialization Sequence Completed
I 2016.12.18 14:18:46 - DNS of a network adapter forced (Dell Wireless 1820A 802.11ac)
I 2016.12.18 14:18:46 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.18 14:18:46 - Flushing DNS
I 2016.12.18 14:18:46 - Checking route
W 2016.12.18 14:18:58 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.18 14:19:10 - Checking route, 2° try failed (The operation has timed out)
W 2016.12.18 14:19:22 - Checking route, 3° try failed (The operation has timed out)
W 2016.12.18 14:19:34 - Checking route, 4° try failed (The operation has timed out)
W 2016.12.18 14:19:46 - Checking route, 5° try failed (The operation has timed out)
W 2016.12.18 14:19:46 - The operation has timed out
! 2016.12.18 14:19:46 - Disconnecting
. 2016.12.18 14:19:46 - Management - Send 'signal SIGTERM'
. 2016.12.18 14:19:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.18 14:19:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.18 14:19:46 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.18 14:19:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.146 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 14:19:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:19:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 14:19:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:19:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:19:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:19:51 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:19:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 14:19:51 - OpenVPN > Closing TUN/TAP interface
. 2016.12.18 14:19:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.18 14:19:51 - Connection terminated.
I 2016.12.18 14:19:51 - DNS of a network adapter restored to original settings (Dell Wireless 1820A 802.11ac)
I 2016.12.18 14:19:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.12.18 14:19:54 - Checking authorization ...
! 2016.12.18 14:19:55 - Connecting to Alphirk (Netherlands, Alblasserdam)
. 2016.12.18 14:19:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.18 14:19:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.18 14:19:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.18 14:19:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.18 14:19:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:19:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:19:55 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.18 14:19:55 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.18 14:19:55 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.146:443
. 2016.12.18 14:19:55 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.146:443, sid=51805ce2 7c4b96f4
. 2016.12.18 14:19:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 14:19:55 - OpenVPN > Validating certificate key usage
. 2016.12.18 14:19:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 14:19:55 - OpenVPN > VERIFY KU OK
. 2016.12.18 14:19:55 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 14:19:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 14:19:55 - OpenVPN > VERIFY EKU OK
. 2016.12.18 14:19:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 14:19:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 14:19:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:19:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 14:19:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 14:19:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 14:19:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.146:443
. 2016.12.18 14:20:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.18 14:20:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.57.189 255.255.0.0'
. 2016.12.18 14:20:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.18 14:20:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.18 14:20:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.18 14:20:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.18 14:20:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.18 14:20:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.18 14:20:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.18 14:20:00 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.18 14:20:00 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}.tap
. 2016.12.18 14:20:00 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.18 14:20:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.57.189/255.255.0.0 [sUCCEEDED]
. 2016.12.18 14:20:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.57.189/255.255.0.0 on interface {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.18 14:20:00 - OpenVPN > Successful ARP Flush on interface [12] {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}
. 2016.12.18 14:20:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.18 14:20:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.146 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 14:20:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2016.12.18 14:20:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:20:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 10
. 2016.12.18 14:20:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2016.12.18 14:20:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:20:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:20:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 14:20:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:20:05 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 14:20:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 14:20:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 14:20:05 - Starting Management Interface
. 2016.12.18 14:20:05 - OpenVPN > Initialization Sequence Completed
I 2016.12.18 14:20:05 - DNS of a network adapter forced (Dell Wireless 1820A 802.11ac)
I 2016.12.18 14:20:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.18 14:20:05 - Flushing DNS
I 2016.12.18 14:20:05 - Checking route
W 2016.12.18 14:20:17 - Checking route, 1° try failed (The operation has timed out)
W 2016.12.18 14:20:29 - Checking route, 2° try failed (The operation has timed out)
W 2016.12.18 14:20:41 - Checking route, 3° try failed (The operation has timed out)
W 2016.12.18 14:20:53 - Checking route, 4° try failed (The operation has timed out)
I 2016.12.18 14:20:54 - Checking DNS
! 2016.12.18 14:21:06 - Connected.
. 2016.12.18 14:21:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.18 14:21:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.18 14:23:03 - Updating systems & servers data ...
. 2016.12.18 14:23:03 - Systems & servers data update completed
. 2016.12.18 14:53:10 - Updating systems & servers data ...
. 2016.12.18 14:53:10 - Systems & servers data update completed
. 2016.12.18 15:19:57 - OpenVPN > TLS: soft reset sec=0 bytes=670256946/0 pkts=966906/0
. 2016.12.18 15:19:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 15:19:57 - OpenVPN > Validating certificate key usage
. 2016.12.18 15:19:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 15:19:57 - OpenVPN > VERIFY KU OK
. 2016.12.18 15:19:57 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 15:19:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 15:19:57 - OpenVPN > VERIFY EKU OK
. 2016.12.18 15:19:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 15:19:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 15:19:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 15:19:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 15:19:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 15:19:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 15:23:16 - Updating systems & servers data ...
. 2016.12.18 15:23:17 - Systems & servers data update completed
. 2016.12.18 15:53:23 - Updating systems & servers data ...
. 2016.12.18 15:53:24 - Systems & servers data update completed
I 2016.12.18 16:19:57 - Renewing TLS key
. 2016.12.18 16:19:57 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.12.18 16:19:59 - OpenVPN > TLS: soft reset sec=0 bytes=220874005/0 pkts=228783/0
. 2016.12.18 16:19:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 16:19:59 - OpenVPN > Validating certificate key usage
. 2016.12.18 16:19:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 16:19:59 - OpenVPN > VERIFY KU OK
. 2016.12.18 16:19:59 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 16:19:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 16:19:59 - OpenVPN > VERIFY EKU OK
. 2016.12.18 16:19:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 16:20:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 16:20:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 16:20:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 16:20:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 16:20:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 16:23:30 - Updating systems & servers data ...
. 2016.12.18 16:23:31 - Systems & servers data update completed
. 2016.12.18 16:53:37 - Updating systems & servers data ...
. 2016.12.18 16:53:38 - Systems & servers data update completed
I 2016.12.18 17:19:59 - Renewing TLS key
. 2016.12.18 17:19:59 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.12.18 17:20:02 - OpenVPN > TLS: soft reset sec=0 bytes=922506/0 pkts=4356/0
. 2016.12.18 17:20:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 17:20:02 - OpenVPN > Validating certificate key usage
. 2016.12.18 17:20:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 17:20:02 - OpenVPN > VERIFY KU OK
. 2016.12.18 17:20:02 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 17:20:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 17:20:02 - OpenVPN > VERIFY EKU OK
. 2016.12.18 17:20:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 17:20:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 17:20:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 17:20:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 17:20:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 17:20:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 17:23:44 - Updating systems & servers data ...
. 2016.12.18 17:23:44 - Systems & servers data update completed
. 2016.12.18 17:53:51 - Updating systems & servers data ...
. 2016.12.18 17:53:51 - Systems & servers data update completed
. 2016.12.18 18:20:02 - OpenVPN > TLS: soft reset sec=0 bytes=1270133/0 pkts=5363/0
. 2016.12.18 18:20:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 18:20:02 - OpenVPN > Validating certificate key usage
. 2016.12.18 18:20:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 18:20:02 - OpenVPN > VERIFY KU OK
. 2016.12.18 18:20:02 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 18:20:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 18:20:02 - OpenVPN > VERIFY EKU OK
. 2016.12.18 18:20:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 18:20:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 18:20:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 18:20:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 18:20:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 18:20:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 18:23:57 - Updating systems & servers data ...
. 2016.12.18 18:23:59 - Systems & servers data update completed
. 2016.12.18 18:54:06 - Updating systems & servers data ...
. 2016.12.18 18:54:06 - Systems & servers data update completed
. 2016.12.18 18:54:57 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.12.18 18:54:58 - OpenVpn Management > >FATAL:TUN/TAP I/O operation aborted, exiting
. 2016.12.18 18:54:58 - OpenVPN > TUN/TAP I/O operation aborted, exiting
. 2016.12.18 18:54:58 - OpenVPN > Exiting due to fatal error
. 2016.12.18 18:54:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.146 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 18:54:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 18:54:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 18:54:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.18 18:54:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 18:54:58 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.12.18 18:54:58 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.12.18 18:54:58 - OpenVPN > Route deletion fallback to route.exe
. 2016.12.18 18:54:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.18 18:54:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 18:54:58 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.12.18 18:54:58 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.12.18 18:54:58 - OpenVPN > Route deletion fallback to route.exe
. 2016.12.18 18:54:58 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.18 18:54:58 - OpenVPN > Closing TUN/TAP interface
! 2016.12.18 18:54:58 - Disconnecting
. 2016.12.18 18:54:58 - Connection terminated.
I 2016.12.18 20:17:20 - DNS of a network adapter restored to original settings (Dell Wireless 1820A 802.11ac)
I 2016.12.18 20:17:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
. 2016.12.18 20:17:30 - Updating systems & servers data ...
. 2016.12.18 20:17:30 - Systems & servers data update completed
I 2016.12.18 20:17:33 - Checking authorization ...
! 2016.12.18 20:17:33 - Connecting to Alrai (Netherlands, Alblasserdam)
. 2016.12.18 20:17:34 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.18 20:17:34 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.18 20:17:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.18 20:17:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.18 20:17:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 20:17:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 20:17:34 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.18 20:17:34 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.18 20:17:34 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.78:443
. 2016.12.18 20:17:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.78:443, sid=6af263aa 4c36a944
. 2016.12.18 20:17:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 20:17:34 - OpenVPN > Validating certificate key usage
. 2016.12.18 20:17:34 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 20:17:34 - OpenVPN > VERIFY KU OK
. 2016.12.18 20:17:34 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 20:17:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 20:17:34 - OpenVPN > VERIFY EKU OK
. 2016.12.18 20:17:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 20:17:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 20:17:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 20:17:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 20:17:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 20:17:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 20:17:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.78:443
. 2016.12.18 20:17:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.18 20:17:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.92.47 255.255.0.0'
. 2016.12.18 20:17:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.18 20:17:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.18 20:17:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.18 20:17:37 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.18 20:17:37 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.18 20:17:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.18 20:17:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.18 20:17:37 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.18 20:17:37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}.tap
. 2016.12.18 20:17:37 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.18 20:17:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.92.47/255.255.0.0 [sUCCEEDED]
. 2016.12.18 20:17:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.92.47/255.255.0.0 on interface {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.18 20:17:37 - OpenVPN > Successful ARP Flush on interface [12] {B7603D0E-2B56-42D1-B5B5-EC9CC037FE9E}
. 2016.12.18 20:17:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.12.18 20:17:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.78 MASK 255.255.255.255 192.168.0.1
. 2016.12.18 20:17:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2016.12.18 20:17:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 20:17:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 10
. 2016.12.18 20:17:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2016.12.18 20:17:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 20:17:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 20:17:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 20:17:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 20:17:42 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.18 20:17:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.18 20:17:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.18 20:17:42 - Starting Management Interface
. 2016.12.18 20:17:42 - OpenVPN > Initialization Sequence Completed
I 2016.12.18 20:17:42 - DNS of a network adapter forced (Dell Wireless 1820A 802.11ac)
I 2016.12.18 20:17:42 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.12.18 20:17:42 - Flushing DNS
I 2016.12.18 20:17:42 - Checking route
I 2016.12.18 20:17:43 - Checking DNS
! 2016.12.18 20:17:55 - Connected.
. 2016.12.18 20:17:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.18 20:17:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.18 20:47:53 - Updating systems & servers data ...
. 2016.12.18 20:47:54 - Systems & servers data update completed
. 2016.12.18 20:51:19 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #42871 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.12.18 21:17:35 - OpenVPN > TLS: soft reset sec=0 bytes=758244121/0 pkts=1041737/0
. 2016.12.18 21:17:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.18 21:17:35 - OpenVPN > Validating certificate key usage
. 2016.12.18 21:17:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.18 21:17:35 - OpenVPN > VERIFY KU OK
. 2016.12.18 21:17:35 - OpenVPN > Validating certificate extended key usage
. 2016.12.18 21:17:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.18 21:17:35 - OpenVPN > VERIFY EKU OK
. 2016.12.18 21:17:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.18 21:17:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 21:17:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 21:17:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.18 21:17:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.18 21:17:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.18 21:18:00 - Updating systems & servers data ...
. 2016.12.18 21:18:01 - Systems & servers data update completed
. 2016.12.18 21:24:27 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #43603 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.12.18 21:24:27 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #43604 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.12.18 21:24:27 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #43605 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.12.18 21:24:27 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #43606 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

 

Windows 10

 

The connection gets dropped and Eddie shows an upload speed of around 20MBs, which is more than my ISP provides. Event happened around 21:40 - no entry in log.

 

This is not the first time this has happened nor am I the first person it has happened to it would appear.

 

AirVPN is a very dodgy thing on my laptop - I haven't really had problems on my workstation (running Windows 7) - but I wish I hadn't signed up for a whole year - I just went by the reviews.

 

Even without the complete dropping of connection, the network goes unresponsive quite often - downloaded bytes drops to zero. It's getting quite frustrating.

Share this post


Link to post

That means you have an application that is causing DoS on your network adapter. Obviously if your ISP doesn't support that speed you will

encounter packet loss, which will result in timeouts and end up with the tunnel not being able to function anymore.

Check for any applications, especially P2P ones and find which one it is.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

Zhang,

 

Thank you so much for the speedy reply. I am a networking newbie so I hope you can bear with me.

 

I don't have p2p software installed on my laptop. By DoS do you mean Denial of Service? As in malicious software? Or something more innocuous?

 

Please could you give me some pointers as to how to go about investigating this.

 

Thank you so much once again.

Share this post


Link to post

Denial of Service as in a network congestion caused by a software on your side, not necessary from malicious software like viruses/worms.

If your machine bursts 20MB/s while being idle, there is definitely something you should check on your system.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

OK guys,

 

I installed Wireshark to do some more investigating but the problem hasn't recurred till today. Basically I get massive bursts of malformed packets such as the following.

 

 

225394    106.874146    192.168.0.3    213.152.161.116    QUIC    751    54730→443 Len=709[Malformed Packet]

 

213.152.161.116 is an airvpn server. 192.168.0.3 is local yes?

 

Each packet is UDP/QUIC of varying though similar size.

 

src port: 54730

dest port: 443

 

Any ideas on how I would go about identifying which process is using port 54730? Or some other recommended line of action?

 

many thanks

Share this post


Link to post

Happened again. This time the packets are encrypted payload, i.e. not malformed. Same source and destination ports and protocol.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...