Jump to content
Not connected, Your IP: 34.205.246.61
Vergm8da

Can't connect. Have tried all recommended fixes.

Recommended Posts

Windows 10 user here. Have had no trouble connecting in the past but today nothing is working. Reinstalled the TAP driver, deleted the executable, redownloaded, tried again, flushed DNS, etc. Nothing working. Log below.

 

I 2016.12.31 13:29:36 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.12.31 13:29:37 - Reading options from C:\Users\user\AppData\Local\AirVPN\AirVPN.xml
. 2016.12.31 13:29:37 - Data Path: C:\Users\user\AppData\Local\AirVPN
. 2016.12.31 13:29:37 - App Path: C:\Program Files\AirVPN
. 2016.12.31 13:29:37 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.31 13:29:37 - Command line arguments (1): path="home"
. 2016.12.31 13:29:37 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.12.31 13:29:37 - Updating systems & servers data ...
. 2016.12.31 13:29:39 - Systems & servers data update completed
I 2016.12.31 13:29:44 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.12.31 13:29:44 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.31 13:29:44 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.31 13:29:44 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.12.31 13:29:44 - Ready
I 2016.12.31 13:29:49 - Session starting.
I 2016.12.31 13:29:50 - Checking authorization ...
! 2016.12.31 13:29:50 - Connecting to Enif (Canada, Toronto, Ontario)
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:50 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:50 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:50 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:50 LOG5[ui]: Reading configuration from file C:\Users\user\AppData\Local\AirVPN\d0758084d35ba2905148a44c0f144cc188eda8a400435d4136801b47e8528e90.tmp.ssl
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:50 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG6[ui]: Initializing service [openvpn]
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG5[ui]: Configuration successful
. 2016.12.31 13:29:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.31 13:29:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.31 13:29:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.31 13:29:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.31 13:29:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:29:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:29:51 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.31 13:29:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:24465 [nonblock]
. 2016.12.31 13:29:51 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:24465
. 2016.12.31 13:29:51 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.31 13:29:51 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:24465
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50078
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG6[0]: Failover strategy: round-robin
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG6[0]: s_connect: connecting 104.254.90.244:443
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG5[0]: s_connect: connected 104.254.90.244:443
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.151:50079
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG6[0]: SNI: sending servername: 104.254.90.244
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG6[0]: SSL connected: new session negotiated
. 2016.12.31 13:29:51 - SSL > 2016.12.31 13:29:51 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.31 13:29:51 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:24465, sid=e0752bff cce31111
. 2016.12.31 13:29:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.31 13:29:51 - OpenVPN > Validating certificate key usage
. 2016.12.31 13:29:51 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.31 13:29:51 - OpenVPN > VERIFY KU OK
. 2016.12.31 13:29:51 - OpenVPN > Validating certificate extended key usage
. 2016.12.31 13:29:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.31 13:29:51 - OpenVPN > VERIFY EKU OK
. 2016.12.31 13:29:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.31 13:29:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:29:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:29:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:29:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:29:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.31 13:29:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:24465
. 2016.12.31 13:29:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.31 13:29:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.7.53 255.255.0.0'
. 2016.12.31 13:29:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.31 13:29:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.31 13:29:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.31 13:29:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.31 13:29:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.31 13:29:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.31 13:29:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.31 13:29:56 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.31 13:29:56 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{75E79F00-8D1F-4FA5-9E58-739BA689FFA0}.tap
. 2016.12.31 13:29:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.31 13:29:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.7.53/255.255.0.0 [sUCCEEDED]
. 2016.12.31 13:29:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.7.53/255.255.0.0 on interface {75E79F00-8D1F-4FA5-9E58-739BA689FFA0} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.31 13:29:56 - OpenVPN > Successful ARP Flush on interface [28] {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}
. 2016.12.31 13:30:01 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:01 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:02 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:06 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:06 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:06 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:07 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:07 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:07 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:08 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:08 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:08 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:09 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:09 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:09 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:11 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:11 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:11 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:12 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:13 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:13 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:13 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:14 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:14 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:14 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:15 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:15 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:15 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:16 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:16 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:17 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:18 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:18 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:18 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:19 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:19 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:19 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:20 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:20 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:20 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:21 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:22 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:23 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:23 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:24 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:24 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:25 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:25 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:26 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:27 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:27 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:28 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:28 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:28 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:29 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:29 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:30 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:30 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:30 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:30:32 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:30:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:30:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:30:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.0.0.1 MASK 255.255.255.255 10.0.0.1 IF 8
. 2016.12.31 13:30:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:30:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:30:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.31 13:30:32 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.50.0.1
. 2016.12.31 13:30:32 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.31 13:30:32 - OpenVPN > Route addition fallback to route.exe
. 2016.12.31 13:30:32 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:30:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.31 13:30:32 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.50.0.1
. 2016.12.31 13:30:32 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.31 13:30:32 - OpenVPN > Route addition fallback to route.exe
. 2016.12.31 13:30:32 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:30:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.244 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:30:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:30:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:30:32 - OpenVPN > SYSTEM ROUTING TABLE
. 2016.12.31 13:30:32 - OpenVPN > 0.0.0.0 0.0.0.0 10.0.0.1 p=0 i=8 t=4 pr=3 a=1266 h=0 m=35/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 0.0.0.0 128.0.0.0 10.50.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 10.0.0.0 255.255.255.0 10.0.0.151 p=0 i=8 t=3 pr=2 a=1266 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 10.0.0.1 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 10.0.0.151 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=1266 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 10.0.0.255 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=1266 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 104.254.90.244 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=1281 h=0 m=331/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=1281 h=0 m=331/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 127.0.0.1 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=1281 h=0 m=331/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 128.0.0.0 128.0.0.0 10.50.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 169.254.0.0 255.255.0.0 169.254.181.248 p=0 i=28 t=3 pr=2 a=32 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 169.254.181.248 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=32 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 169.254.255.255 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=32 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=1281 h=0 m=331/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 224.0.0.0 240.0.0.0 10.0.0.151 p=0 i=8 t=3 pr=2 a=1271 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 224.0.0.0 240.0.0.0 169.254.181.248 p=0 i=28 t=3 pr=2 a=63 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=1281 h=0 m=331/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 255.255.255.255 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=1271 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > 255.255.255.255 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=63 h=0 m=291/0/0/0/0
. 2016.12.31 13:30:32 - OpenVPN > SYSTEM ADAPTER LIST
. 2016.12.31 13:30:32 - OpenVPN > Bluetooth Device (Personal Area Network)
. 2016.12.31 13:30:32 - OpenVPN >   Index = 9
. 2016.12.31 13:30:32 - OpenVPN >   GUID = {80A95DC0-2D96-4488-AE49-8D7464F38DEF}
. 2016.12.31 13:30:32 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.12.31 13:30:32 - OpenVPN >   MAC = ac:d1:b8:e3:c4:96
. 2016.12.31 13:30:32 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:30:32 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:30:32 2016
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:30:32 2016
. 2016.12.31 13:30:32 - OpenVPN >   DNS SERV =
. 2016.12.31 13:30:32 - OpenVPN > TAP-Windows Adapter V9
. 2016.12.31 13:30:32 - OpenVPN >   Index = 28
. 2016.12.31 13:30:32 - OpenVPN >   GUID = {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}
. 2016.12.31 13:30:32 - OpenVPN >   IP = 169.254.181.248/255.255.0.0
. 2016.12.31 13:30:32 - OpenVPN >   MAC = 00:ff:75:e7:9f:00
. 2016.12.31 13:30:32 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:30:32 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:30:32 2016
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:30:32 2016
. 2016.12.31 13:30:32 - OpenVPN >   DNS SERV =
. 2016.12.31 13:30:32 - OpenVPN > The Broadcom 802.11 Network Adapter provides wireless local area networking.
. 2016.12.31 13:30:32 - OpenVPN >   Index = 8
. 2016.12.31 13:30:32 - OpenVPN >   GUID = {74152D42-7E97-47F5-A835-7EFFD93294AD}
. 2016.12.31 13:30:32 - OpenVPN >   IP = 10.0.0.151/255.255.255.0
. 2016.12.31 13:30:32 - OpenVPN >   MAC = ac:d1:b8:e3:c4:95
. 2016.12.31 13:30:32 - OpenVPN >   GATEWAY = 10.0.0.1/255.255.255.255
. 2016.12.31 13:30:32 - OpenVPN >   DHCP SERV = 10.0.0.1/255.255.255.255
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:27:26 2016
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Jan 07 13:27:26 2017
. 2016.12.31 13:30:32 - OpenVPN >   DNS SERV = 75.75.76.76/255.255.255.255 75.75.75.75/255.255.255.255
. 2016.12.31 13:30:32 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter
. 2016.12.31 13:30:32 - OpenVPN >   Index = 15
. 2016.12.31 13:30:32 - OpenVPN >   GUID = {C0B74B97-C159-4425-8ABC-6F184803674E}
. 2016.12.31 13:30:32 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.12.31 13:30:32 - OpenVPN >   MAC = ae:d1:b8:e3:c4:95
. 2016.12.31 13:30:32 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:30:32 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:30:32 2016
. 2016.12.31 13:30:32 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:30:32 2016
. 2016.12.31 13:30:32 - OpenVPN >   DNS SERV =
. 2016.12.31 13:30:32 - Starting Management Interface
. 2016.12.31 13:30:32 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
! 2016.12.31 13:30:32 - Disconnecting
. 2016.12.31 13:30:32 - Management - Send 'signal SIGTERM'
. 2016.12.31 13:30:32 - SSL > 2016.12.31 13:30:32 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.12.31 13:30:32 - SSL > 2016.12.31 13:30:32 LOG5[0]: Connection reset: 5776 byte(s) sent to SSL, 6476 byte(s) sent to socket
. 2016.12.31 13:30:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.31 13:30:32 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
I 2016.12.31 13:30:32 - DNS of a network adapter forced (The Broadcom 802.11 Network Adapter provides wireless local area networking.)
I 2016.12.31 13:30:33 - Flushing DNS
W 2016.12.31 13:30:33 - Waiting TUN interface
. 2016.12.31 13:30:33 - Connection terminated.
I 2016.12.31 13:30:34 - DNS of a network adapter restored to original settings (The Broadcom 802.11 Network Adapter provides wireless local area networking.)
W 2016.12.31 13:30:35 - Waiting TUN interface
I 2016.12.31 13:30:37 - Checking authorization ...
! 2016.12.31 13:30:37 - Connecting to Enif (Canada, Toronto, Ontario)
. 2016.12.31 13:30:37 - SSL > 2016.12.31 13:30:37 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.12.31 13:30:37 - SSL > 2016.12.31 13:30:37 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.12.31 13:30:37 - SSL > 2016.12.31 13:30:37 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.31 13:30:37 - SSL > 2016.12.31 13:30:37 LOG5[ui]: Reading configuration from file C:\Users\user\AppData\Local\AirVPN\103da4b04f0215a6184228ef2ff877f0505b02726e4f191a8179f8a52b7ced84.tmp.ssl
. 2016.12.31 13:30:37 - SSL > 2016.12.31 13:30:37 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.31 13:30:37 - SSL > 2016.12.31 13:30:37 LOG6[ui]: Initializing service [openvpn]
. 2016.12.31 13:30:37 - SSL > 2016.12.31 13:30:37 LOG5[ui]: Configuration successful
W 2016.12.31 13:30:37 - Waiting TUN interface
. 2016.12.31 13:30:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.31 13:30:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.31 13:30:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.31 13:30:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.31 13:30:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.31 13:30:38 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:37350 [nonblock]
. 2016.12.31 13:30:38 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:37350
. 2016.12.31 13:30:38 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.31 13:30:38 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:37350
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50158
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG6[0]: Failover strategy: round-robin
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG6[0]: s_connect: connecting 104.254.90.244:443
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG5[0]: s_connect: connected 104.254.90.244:443
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.151:50159
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG6[0]: SNI: sending servername: 104.254.90.244
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG6[0]: SSL connected: new session negotiated
. 2016.12.31 13:30:38 - SSL > 2016.12.31 13:30:38 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.31 13:30:38 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:37350, sid=9886251f 007d08df
. 2016.12.31 13:30:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.31 13:30:38 - OpenVPN > Validating certificate key usage
. 2016.12.31 13:30:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.31 13:30:38 - OpenVPN > VERIFY KU OK
. 2016.12.31 13:30:38 - OpenVPN > Validating certificate extended key usage
. 2016.12.31 13:30:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.31 13:30:38 - OpenVPN > VERIFY EKU OK
. 2016.12.31 13:30:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.31 13:30:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:30:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:30:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.31 13:30:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:37350
W 2016.12.31 13:30:40 - Waiting TUN interface
. 2016.12.31 13:30:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.31 13:30:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.7.53 255.255.0.0'
. 2016.12.31 13:30:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.31 13:30:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.31 13:30:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.31 13:30:41 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.31 13:30:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.31 13:30:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.31 13:30:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.31 13:30:41 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.31 13:30:41 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{75E79F00-8D1F-4FA5-9E58-739BA689FFA0}.tap
. 2016.12.31 13:30:41 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.31 13:30:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.7.53/255.255.0.0 [sUCCEEDED]
. 2016.12.31 13:30:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.7.53/255.255.0.0 on interface {75E79F00-8D1F-4FA5-9E58-739BA689FFA0} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.31 13:30:41 - OpenVPN > Successful ARP Flush on interface [28] {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}
I 2016.12.31 13:30:42 - Checking route
E 2016.12.31 13:30:42 - Routing checking failed.
. 2016.12.31 13:30:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.31 13:30:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.31 13:30:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.244 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:30:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.31 13:30:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:30:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.31 13:30:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:30:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.31 13:30:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.31 13:30:42 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.50.0.1
. 2016.12.31 13:30:42 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.12.31 13:30:42 - OpenVPN > Route deletion fallback to route.exe
. 2016.12.31 13:30:42 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:30:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.31 13:30:42 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.50.0.1
. 2016.12.31 13:30:42 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.12.31 13:30:42 - OpenVPN > Route deletion fallback to route.exe
. 2016.12.31 13:30:42 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:30:42 - OpenVPN > Closing TUN/TAP interface
. 2016.12.31 13:30:42 - OpenVPN > SIGTERM[hard,] received, process exiting
! 2016.12.31 13:30:42 - Disconnecting
. 2016.12.31 13:30:42 - Connection terminated.
I 2016.12.31 13:30:45 - Checking authorization ...
! 2016.12.31 13:30:46 - Connecting to Zaniah (Sweden, Uppsala)
. 2016.12.31 13:30:46 - SSL > 2016.12.31 13:30:46 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.12.31 13:30:46 - SSL > 2016.12.31 13:30:46 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.12.31 13:30:46 - SSL > 2016.12.31 13:30:46 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.31 13:30:46 - SSL > 2016.12.31 13:30:46 LOG5[ui]: Reading configuration from file C:\Users\user\AppData\Local\AirVPN\5a93e15c69318773e71d2a95f5c46a91315a0df49819d9c3fa0c388404743d96.tmp.ssl
. 2016.12.31 13:30:46 - SSL > 2016.12.31 13:30:46 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.31 13:30:46 - SSL > 2016.12.31 13:30:46 LOG6[ui]: Initializing service [openvpn]
. 2016.12.31 13:30:46 - SSL > 2016.12.31 13:30:46 LOG5[ui]: Configuration successful
. 2016.12.31 13:30:46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.31 13:30:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.31 13:30:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.31 13:30:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.31 13:30:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:47 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.31 13:30:47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:29370 [nonblock]
. 2016.12.31 13:30:47 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:29370
. 2016.12.31 13:30:47 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.31 13:30:47 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:29370
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50167
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG6[0]: Failover strategy: round-robin
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG6[0]: s_connect: connecting 62.102.148.176:443
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG5[0]: s_connect: connected 62.102.148.176:443
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.151:50168
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG6[0]: SNI: sending servername: 62.102.148.176
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG6[0]: SSL connected: new session negotiated
. 2016.12.31 13:30:47 - SSL > 2016.12.31 13:30:47 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.31 13:30:47 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:29370, sid=ab5d31ed 154cf1ee
. 2016.12.31 13:30:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.31 13:30:47 - OpenVPN > Validating certificate key usage
. 2016.12.31 13:30:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.31 13:30:47 - OpenVPN > VERIFY KU OK
. 2016.12.31 13:30:47 - OpenVPN > Validating certificate extended key usage
. 2016.12.31 13:30:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.31 13:30:47 - OpenVPN > VERIFY EKU OK
. 2016.12.31 13:30:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.31 13:30:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:30:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:30:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:30:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.31 13:30:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:29370
. 2016.12.31 13:30:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.31 13:30:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.5.235 255.255.0.0'
. 2016.12.31 13:30:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.31 13:30:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.31 13:30:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.31 13:30:51 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.31 13:30:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.31 13:30:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.31 13:30:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.31 13:30:51 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.31 13:30:51 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{75E79F00-8D1F-4FA5-9E58-739BA689FFA0}.tap
. 2016.12.31 13:30:51 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.31 13:30:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.5.235/255.255.0.0 [sUCCEEDED]
. 2016.12.31 13:30:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.5.235/255.255.0.0 on interface {75E79F00-8D1F-4FA5-9E58-739BA689FFA0} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.12.31 13:30:51 - OpenVPN > Successful ARP Flush on interface [28] {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}
. 2016.12.31 13:30:57 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:30:57 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:30:57 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:01 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:01 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:01 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:02 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:02 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:03 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:03 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:03 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:04 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:04 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:04 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:05 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:05 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:05 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:07 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:07 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:07 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:08 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:08 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:08 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:09 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:09 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:09 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:10 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:10 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:10 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:11 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:11 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:11 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:12 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:13 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:13 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:13 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:14 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:14 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:14 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:15 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:15 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:15 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:16 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:16 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:17 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:18 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:18 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:18 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:19 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:19 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:19 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:21 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:21 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:22 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:22 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:22 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:23 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:23 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:24 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:31:24 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:31:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
. 2016.12.31 13:31:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:31:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:31:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:31:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.0.0.1 MASK 255.255.255.255 10.0.0.1 IF 8
. 2016.12.31 13:31:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:31:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:31:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.31 13:31:26 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.50.0.1
. 2016.12.31 13:31:26 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.31 13:31:26 - OpenVPN > Route addition fallback to route.exe
. 2016.12.31 13:31:26 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:31:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.12.31 13:31:26 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.50.0.1
. 2016.12.31 13:31:26 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.31 13:31:26 - OpenVPN > Route addition fallback to route.exe
. 2016.12.31 13:31:26 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:31:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.176 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:31:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:31:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:31:26 - OpenVPN > SYSTEM ROUTING TABLE
. 2016.12.31 13:31:26 - OpenVPN > 0.0.0.0 0.0.0.0 10.0.0.1 p=0 i=8 t=4 pr=3 a=1320 h=0 m=35/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 0.0.0.0 128.0.0.0 10.50.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 10.0.0.0 255.255.255.0 10.0.0.151 p=0 i=8 t=3 pr=2 a=1320 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 10.0.0.1 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 10.0.0.151 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=1320 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 10.0.0.255 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=1320 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 62.102.148.176 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=1335 h=0 m=331/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=1335 h=0 m=331/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 127.0.0.1 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=1335 h=0 m=331/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 128.0.0.0 128.0.0.0 10.50.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 169.254.0.0 255.255.0.0 169.254.181.248 p=0 i=28 t=3 pr=2 a=86 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 169.254.181.248 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=86 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 169.254.255.255 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=86 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=1335 h=0 m=331/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 224.0.0.0 240.0.0.0 10.0.0.151 p=0 i=8 t=3 pr=2 a=1325 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 224.0.0.0 240.0.0.0 169.254.181.248 p=0 i=28 t=3 pr=2 a=117 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=1335 h=0 m=331/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 255.255.255.255 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=1325 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > 255.255.255.255 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=117 h=0 m=291/0/0/0/0
. 2016.12.31 13:31:26 - OpenVPN > SYSTEM ADAPTER LIST
. 2016.12.31 13:31:26 - OpenVPN > Bluetooth Device (Personal Area Network)
. 2016.12.31 13:31:26 - OpenVPN >   Index = 9
. 2016.12.31 13:31:26 - OpenVPN >   GUID = {80A95DC0-2D96-4488-AE49-8D7464F38DEF}
. 2016.12.31 13:31:26 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.12.31 13:31:26 - OpenVPN >   MAC = ac:d1:b8:e3:c4:96
. 2016.12.31 13:31:26 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:31:26 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:31:26 2016
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:31:26 2016
. 2016.12.31 13:31:26 - OpenVPN >   DNS SERV =
. 2016.12.31 13:31:26 - OpenVPN > TAP-Windows Adapter V9
. 2016.12.31 13:31:26 - OpenVPN >   Index = 28
. 2016.12.31 13:31:26 - OpenVPN >   GUID = {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}
. 2016.12.31 13:31:26 - OpenVPN >   IP = 169.254.181.248/255.255.0.0
. 2016.12.31 13:31:26 - OpenVPN >   MAC = 00:ff:75:e7:9f:00
. 2016.12.31 13:31:26 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:31:26 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:31:26 2016
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:31:26 2016
. 2016.12.31 13:31:26 - OpenVPN >   DNS SERV =
. 2016.12.31 13:31:26 - OpenVPN > The Broadcom 802.11 Network Adapter provides wireless local area networking.
. 2016.12.31 13:31:26 - OpenVPN >   Index = 8
. 2016.12.31 13:31:26 - OpenVPN >   GUID = {74152D42-7E97-47F5-A835-7EFFD93294AD}
. 2016.12.31 13:31:26 - OpenVPN >   IP = 10.0.0.151/255.255.255.0
. 2016.12.31 13:31:26 - OpenVPN >   MAC = ac:d1:b8:e3:c4:95
. 2016.12.31 13:31:26 - OpenVPN >   GATEWAY = 10.0.0.1/255.255.255.255
. 2016.12.31 13:31:26 - OpenVPN >   DHCP SERV = 10.0.0.1/255.255.255.255
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:30:34 2016
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Jan 07 13:30:34 2017
. 2016.12.31 13:31:26 - OpenVPN >   DNS SERV = 75.75.76.76/255.255.255.255 75.75.75.75/255.255.255.255
. 2016.12.31 13:31:26 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter
. 2016.12.31 13:31:26 - OpenVPN >   Index = 15
. 2016.12.31 13:31:26 - OpenVPN >   GUID = {C0B74B97-C159-4425-8ABC-6F184803674E}
. 2016.12.31 13:31:26 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.12.31 13:31:26 - OpenVPN >   MAC = ae:d1:b8:e3:c4:95
. 2016.12.31 13:31:26 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:31:26 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:31:26 2016
. 2016.12.31 13:31:26 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:31:26 2016
. 2016.12.31 13:31:26 - OpenVPN >   DNS SERV =
. 2016.12.31 13:31:26 - Starting Management Interface
. 2016.12.31 13:31:26 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
! 2016.12.31 13:31:26 - Disconnecting
. 2016.12.31 13:31:26 - Management - Send 'signal SIGTERM'
. 2016.12.31 13:31:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.31 13:31:26 - SSL > 2016.12.31 13:31:26 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.12.31 13:31:26 - SSL > 2016.12.31 13:31:26 LOG5[0]: Connection reset: 5776 byte(s) sent to SSL, 6477 byte(s) sent to socket
I 2016.12.31 13:31:26 - DNS of a network adapter forced (The Broadcom 802.11 Network Adapter provides wireless local area networking.)
I 2016.12.31 13:31:26 - Flushing DNS
W 2016.12.31 13:31:27 - Waiting TUN interface
. 2016.12.31 13:31:27 - Connection terminated.
I 2016.12.31 13:31:27 - DNS of a network adapter restored to original settings (The Broadcom 802.11 Network Adapter provides wireless local area networking.)
W 2016.12.31 13:31:29 - Waiting TUN interface
I 2016.12.31 13:31:31 - Checking authorization ...
! 2016.12.31 13:31:31 - Connecting to Enif (Canada, Toronto, Ontario)
W 2016.12.31 13:31:31 - Waiting TUN interface
. 2016.12.31 13:31:32 - SSL > 2016.12.31 13:31:31 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.12.31 13:31:32 - SSL > 2016.12.31 13:31:31 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.12.31 13:31:32 - SSL > 2016.12.31 13:31:31 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.12.31 13:31:32 - SSL > 2016.12.31 13:31:31 LOG5[ui]: Reading configuration from file C:\Users\user\AppData\Local\AirVPN\a782e9b73fed0cdb54a09f7db31075c54211a4d7741f5c87ec1c8b32c9024045.tmp.ssl
. 2016.12.31 13:31:32 - SSL > 2016.12.31 13:31:31 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.12.31 13:31:32 - SSL > 2016.12.31 13:31:32 LOG6[ui]: Initializing service [openvpn]
. 2016.12.31 13:31:32 - SSL > 2016.12.31 13:31:32 LOG5[ui]: Configuration successful
. 2016.12.31 13:31:32 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.31 13:31:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.31 13:31:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.31 13:31:33 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.31 13:31:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:31:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:31:33 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50190
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG6[0]: Failover strategy: round-robin
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG6[0]: s_connect: connecting 104.254.90.244:443
. 2016.12.31 13:31:33 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:48616 [nonblock]
. 2016.12.31 13:31:33 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:48616
. 2016.12.31 13:31:33 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.12.31 13:31:33 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:48616
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG5[0]: s_connect: connected 104.254.90.244:443
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.151:50191
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG6[0]: SNI: sending servername: 104.254.90.244
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG6[0]: CERT: Locally installed certificate matched
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG6[0]: SSL connected: new session negotiated
. 2016.12.31 13:31:33 - SSL > 2016.12.31 13:31:33 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.12.31 13:31:33 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:48616, sid=5f011433 91158c1b
. 2016.12.31 13:31:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.31 13:31:33 - OpenVPN > Validating certificate key usage
. 2016.12.31 13:31:33 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.31 13:31:33 - OpenVPN > VERIFY KU OK
. 2016.12.31 13:31:33 - OpenVPN > Validating certificate extended key usage
. 2016.12.31 13:31:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.31 13:31:33 - OpenVPN > VERIFY EKU OK
. 2016.12.31 13:31:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
W 2016.12.31 13:31:33 - Waiting TUN interface
. 2016.12.31 13:31:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:31:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:31:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:31:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:31:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.31 13:31:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:48616
 

Share this post


Link to post

Hello!

 

Please go to your Control Panel>Networking>Change Adapter settings>TAP driver properties>Advanced>Change "Media Status" to "Always connected">Click Apply and if necessary, then restart Eddie. If it was already set to always connected, then please try "application controlled" instead.

 

In addition, in the same adapter area, you can go into the properties of each adapter and disable IPv6 too, as that can help. In addition to disabling other networking adapters which you aren't using.

 

Lastly, it seems you're using the SSL protocol, so go into the Eddie preferences>Protocols and change to UDP 443 or TCP 443 and then reconnect to a server, to make it take effect.

 

Do make sure, that if you're using any 3rd party security software, that AirVPN.exe, tap and openvpn.exe are added to any existing exclusion lists. If there's a problem, of course.

 

Otherwise, the Beta Eddie client handles such security software better and thus you don't need to do those things most likely. But start with the TAP thing .

 

Disabling and then re-enabling the TAP driver is also a quick fix, if changing the Media Status doesn't work. But it's not permanent.

 

Happy New Year


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Thanks for the advice. Unfortunately this hasn't seemed to fix it. Attached the logs from subsequent connection attempts.

 

I 2016.12.31 13:53:14 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.12.31 13:53:14 - Reading options from C:\Users\user\AppData\Local\AirVPN\AirVPN.xml
. 2016.12.31 13:53:14 - Data Path: C:\Users\user\AppData\Local\AirVPN
. 2016.12.31 13:53:14 - App Path: C:\Program Files\AirVPN
. 2016.12.31 13:53:14 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.12.31 13:53:14 - Command line arguments (1): path="home"
. 2016.12.31 13:53:14 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.12.31 13:53:14 - Updating systems & servers data ...
I 2016.12.31 13:53:14 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.12.31 13:53:14 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.12.31 13:53:14 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.12.31 13:53:14 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.12.31 13:53:14 - Ready
. 2016.12.31 13:53:15 - Systems & servers data update completed
I 2016.12.31 13:53:18 - Session starting.
I 2016.12.31 13:53:20 - Checking authorization ...
! 2016.12.31 13:53:20 - Connecting to Spica (Canada, Toronto, Ontario)
. 2016.12.31 13:53:20 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.31 13:53:20 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.31 13:53:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.31 13:53:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.31 13:53:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:53:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:53:20 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.31 13:53:20 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.31 13:53:20 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.195:443
. 2016.12.31 13:53:23 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.195:443, sid=28c423e5 5d4521c6
. 2016.12.31 13:53:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.31 13:53:23 - OpenVPN > Validating certificate key usage
. 2016.12.31 13:53:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.31 13:53:23 - OpenVPN > VERIFY KU OK
. 2016.12.31 13:53:23 - OpenVPN > Validating certificate extended key usage
. 2016.12.31 13:53:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.31 13:53:23 - OpenVPN > VERIFY EKU OK
. 2016.12.31 13:53:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.31 13:53:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:53:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:53:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:53:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:53:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.31 13:53:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.195:443
. 2016.12.31 13:53:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.31 13:53:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.73.28 255.255.0.0'
. 2016.12.31 13:53:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.31 13:53:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.31 13:53:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.31 13:53:26 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.31 13:53:26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.31 13:53:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.31 13:53:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.31 13:53:26 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.31 13:53:26 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{75E79F00-8D1F-4FA5-9E58-739BA689FFA0}.tap
. 2016.12.31 13:53:26 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.31 13:53:26 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.73.28/255.255.0.0 [sUCCEEDED]
. 2016.12.31 13:53:26 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.73.28/255.255.0.0 on interface {75E79F00-8D1F-4FA5-9E58-739BA689FFA0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.31 13:53:26 - OpenVPN > Successful ARP Flush on interface [28] {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}
. 2016.12.31 13:53:31 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:31 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:36 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:36 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:36 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:37 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:37 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:39 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:39 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:40 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:41 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:42 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:44 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:45 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:45 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:46 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:47 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:47 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:48 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:49 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:49 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:50 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:51 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:52 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:52 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:52 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:53 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:54 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:55 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:56 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:56 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:56 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:57 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:57 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:57 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:58 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:58 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:53:59 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:53:59 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:53:59 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:54:00 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:54:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2016.12.31 13:54:00 - AirVPN Windows Interface Hack executed (Ethernet 3)
. 2016.12.31 13:54:01 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2016.12.31 13:54:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.19.94.195 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:54:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:54:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:54:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.0.0.1 MASK 255.255.255.255 10.0.0.1 IF 8
. 2016.12.31 13:54:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2016.12.31 13:54:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.12.31 13:54:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.31 13:54:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.12.31 13:54:01 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.31 13:54:01 - OpenVPN > Route addition fallback to route.exe
. 2016.12.31 13:54:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:54:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.31 13:54:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.12.31 13:54:01 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.12.31 13:54:01 - OpenVPN > Route addition fallback to route.exe
. 2016.12.31 13:54:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:54:01 - OpenVPN > SYSTEM ROUTING TABLE
. 2016.12.31 13:54:01 - OpenVPN > 0.0.0.0 0.0.0.0 10.0.0.1 p=0 i=8 t=4 pr=3 a=2676 h=0 m=35/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 10.0.0.0 255.255.255.0 10.0.0.151 p=0 i=8 t=3 pr=2 a=2676 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 10.0.0.1 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 10.0.0.151 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=2676 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 10.0.0.255 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=2676 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=2691 h=0 m=331/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=2691 h=0 m=331/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=2691 h=0 m=331/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 169.254.0.0 255.255.0.0 169.254.181.248 p=0 i=28 t=3 pr=2 a=53 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 169.254.181.248 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=53 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 169.254.255.255 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=53 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 199.19.94.195 255.255.255.255 10.0.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=2691 h=0 m=331/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 224.0.0.0 240.0.0.0 10.0.0.151 p=0 i=8 t=3 pr=2 a=2681 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 224.0.0.0 240.0.0.0 169.254.181.248 p=0 i=28 t=3 pr=2 a=63 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=2691 h=0 m=331/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 255.255.255.255 255.255.255.255 10.0.0.151 p=0 i=8 t=3 pr=2 a=2681 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:01 - OpenVPN > 255.255.255.255 255.255.255.255 169.254.181.248 p=0 i=28 t=3 pr=2 a=63 h=0 m=291/0/0/0/0
. 2016.12.31 13:54:02 - OpenVPN > SYSTEM ADAPTER LIST
. 2016.12.31 13:54:02 - OpenVPN > TAP-Windows Adapter V9
. 2016.12.31 13:54:02 - OpenVPN >   Index = 28
. 2016.12.31 13:54:02 - OpenVPN >   GUID = {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}
. 2016.12.31 13:54:02 - OpenVPN >   IP = 169.254.181.248/255.255.0.0
. 2016.12.31 13:54:02 - OpenVPN >   MAC = 00:ff:75:e7:9f:00
. 2016.12.31 13:54:02 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:54:02 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:54:02 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:54:02 2016
. 2016.12.31 13:54:02 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:54:02 2016
. 2016.12.31 13:54:02 - OpenVPN >   DNS SERV =
. 2016.12.31 13:54:02 - OpenVPN > The Broadcom 802.11 Network Adapter provides wireless local area networking.
. 2016.12.31 13:54:02 - OpenVPN >   Index = 8
. 2016.12.31 13:54:02 - OpenVPN >   GUID = {74152D42-7E97-47F5-A835-7EFFD93294AD}
. 2016.12.31 13:54:02 - OpenVPN >   IP = 10.0.0.151/255.255.255.0
. 2016.12.31 13:54:02 - OpenVPN >   MAC = ac:d1:b8:e3:c4:95
. 2016.12.31 13:54:02 - OpenVPN >   GATEWAY = 10.0.0.1/255.255.255.255
. 2016.12.31 13:54:02 - OpenVPN >   DHCP SERV = 10.0.0.1/255.255.255.255
. 2016.12.31 13:54:02 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:47:55 2016
. 2016.12.31 13:54:02 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Jan 07 13:47:55 2017
. 2016.12.31 13:54:02 - OpenVPN >   DNS SERV = 75.75.76.76/255.255.255.255 75.75.75.75/255.255.255.255
. 2016.12.31 13:54:02 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter
. 2016.12.31 13:54:02 - OpenVPN >   Index = 15
. 2016.12.31 13:54:02 - OpenVPN >   GUID = {C0B74B97-C159-4425-8ABC-6F184803674E}
. 2016.12.31 13:54:02 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2016.12.31 13:54:02 - OpenVPN >   MAC = ae:d1:b8:e3:c4:95
. 2016.12.31 13:54:02 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2016.12.31 13:54:02 - OpenVPN >   DHCP SERV =
. 2016.12.31 13:54:02 - OpenVPN >   DHCP LEASE OBTAINED = Sat Dec 31 13:54:02 2016
. 2016.12.31 13:54:02 - OpenVPN >   DHCP LEASE EXPIRES  = Sat Dec 31 13:54:02 2016
. 2016.12.31 13:54:02 - OpenVPN >   DNS SERV =
. 2016.12.31 13:54:02 - Starting Management Interface
. 2016.12.31 13:54:02 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
I 2016.12.31 13:54:02 - DNS of a network adapter forced (The Broadcom 802.11 Network Adapter provides wireless local area networking.)
I 2016.12.31 13:54:02 - Flushing DNS
! 2016.12.31 13:54:02 - Disconnecting
. 2016.12.31 13:54:02 - Management - Send 'signal SIGTERM'
. 2016.12.31 13:54:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.12.31 13:54:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.12.31 13:54:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.12.31 13:54:02 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.12.31 13:54:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 199.19.94.195 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:54:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.31 13:54:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2016.12.31 13:54:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.12.31 13:54:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.31 13:54:07 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.12.31 13:54:07 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.12.31 13:54:07 - OpenVPN > Route deletion fallback to route.exe
. 2016.12.31 13:54:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:54:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.12.31 13:54:07 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2016.12.31 13:54:07 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2016.12.31 13:54:07 - OpenVPN > Route deletion fallback to route.exe
. 2016.12.31 13:54:07 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.12.31 13:54:07 - OpenVPN > Closing TUN/TAP interface
. 2016.12.31 13:54:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.12.31 13:54:07 - Connection terminated.
I 2016.12.31 13:54:07 - DNS of a network adapter restored to original settings (The Broadcom 802.11 Network Adapter provides wireless local area networking.)
I 2016.12.31 13:54:10 - Checking authorization ...
! 2016.12.31 13:54:11 - Connecting to Spica (Canada, Toronto, Ontario)
. 2016.12.31 13:54:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.12.31 13:54:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.12.31 13:54:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.12.31 13:54:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.12.31 13:54:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:54:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:54:11 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.12.31 13:54:11 - OpenVPN > UDPv4 link local: [undef]
. 2016.12.31 13:54:11 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.195:443
. 2016.12.31 13:54:11 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.195:443, sid=dac23963 923275c9
. 2016.12.31 13:54:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.31 13:54:11 - OpenVPN > Validating certificate key usage
. 2016.12.31 13:54:11 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.31 13:54:11 - OpenVPN > VERIFY KU OK
. 2016.12.31 13:54:11 - OpenVPN > Validating certificate extended key usage
. 2016.12.31 13:54:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.31 13:54:11 - OpenVPN > VERIFY EKU OK
. 2016.12.31 13:54:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.31 13:54:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:54:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:54:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.31 13:54:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.31 13:54:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.31 13:54:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.195:443
. 2016.12.31 13:54:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.31 13:54:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.73.28 255.255.0.0'
. 2016.12.31 13:54:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.31 13:54:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.12.31 13:54:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.31 13:54:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.31 13:54:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.31 13:54:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.31 13:54:14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.12.31 13:54:14 - OpenVPN > open_tun, tt->ipv6=0
. 2016.12.31 13:54:14 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{75E79F00-8D1F-4FA5-9E58-739BA689FFA0}.tap
. 2016.12.31 13:54:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.12.31 13:54:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.73.28/255.255.0.0 [sUCCEEDED]
. 2016.12.31 13:54:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.73.28/255.255.0.0 on interface {75E79F00-8D1F-4FA5-9E58-739BA689FFA0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.12.31 13:54:14 - OpenVPN > Successful ARP Flush on interface [28] {75E79F00-8D1F-4FA5-9E58-739BA689FFA0}

Share this post


Link to post


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hi people,

 

I also cannot connect to the internet with AirVPN. It is is frustrating.

I'm using Windows 10 x64 and eset antivirus 8.

I purchased this VPN, because a lot of people recommended it.

Yesterday, everything was fine.

Today, it is not possible to establish any connection through AirVPN.

Share this post


Link to post

Hi people,

 

I also cannot connect to the internet with AirVPN. It is is frustrating.

I'm using Windows 10 x64 and eset antivirus 8.

I purchased this VPN, because a lot of people recommended it.

Yesterday, everything was fine.

Today, it is not possible to establish any connection through AirVPN.

Welcome to AirVPN!

 

We can't help you much, when you share such little information with us. The OP has already shown how to do it. Otherwise my new user guide in my signature will.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hi,

 

I opened a ticket for help. The team tries to help me.

Until now my problems could not be solved.

I attach the protocoll of AirVPN:

 

I 2017.01.01 18:31:35 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2017.01.01 18:31:35 - Reading options from C:\Users\Murat Topcu\AppData\Local\AirVPN\AirVPN.xml
. 2017.01.01 18:31:35 - Profile options not found, using defaults.
. 2017.01.01 18:31:35 - Data Path: C:\Users\Murat Topcu\AppData\Local\AirVPN
. 2017.01.01 18:31:35 - App Path: C:\Program Files\AirVPN
. 2017.01.01 18:31:35 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2017.01.01 18:31:35 - Command line arguments (1): path="home"
. 2017.01.01 18:31:35 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2017.01.01 18:31:35 - Updating systems & servers data ...
I 2017.01.01 18:31:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2017.01.01 18:31:35 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2017.01.01 18:31:35 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2017.01.01 18:31:35 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2017.01.01 18:31:35 - Ready
. 2017.01.01 18:31:35 - Systems & servers data update completed
I 2017.01.01 18:31:57 - Checking login ...
! 2017.01.01 18:31:58 - Logged in.
! 2017.01.01 18:32:02 - Activation of Network Lock - Windows Firewall
I 2017.01.01 18:32:05 - Session starting.
I 2017.01.01 18:32:05 - IPv6 disabled.
I 2017.01.01 18:32:05 - Checking authorization ...
! 2017.01.01 18:32:05 - Connecting to Pleione (Netherlands, Alblasserdam)
. 2017.01.01 18:32:05 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2017.01.01 18:32:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2017.01.01 18:32:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.01 18:32:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.01 18:32:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:32:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:32:05 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2017.01.01 18:32:05 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.01 18:32:05 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.148:443
. 2017.01.01 18:32:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.148:443, sid=44b22aac 72f3328a
. 2017.01.01 18:32:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.01 18:32:05 - OpenVPN > Validating certificate key usage
. 2017.01.01 18:32:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.01 18:32:05 - OpenVPN > VERIFY KU OK
. 2017.01.01 18:32:05 - OpenVPN > Validating certificate extended key usage
. 2017.01.01 18:32:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.01 18:32:05 - OpenVPN > VERIFY EKU OK
. 2017.01.01 18:32:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.01.01 18:32:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:32:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:32:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:32:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:32:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.01 18:32:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.148:443
. 2017.01.01 18:32:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.01.01 18:32:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.81.141 255.255.0.0'
. 2017.01.01 18:32:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.01 18:32:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2017.01.01 18:32:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.01 18:32:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.01 18:32:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.01 18:32:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.01 18:32:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2017.01.01 18:32:09 - OpenVPN > open_tun, tt->ipv6=0
. 2017.01.01 18:32:09 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{7818C367-76AE-4C0E-B200-02B6CBF89E22}.tap
. 2017.01.01 18:32:09 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.01 18:32:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.81.141/255.255.0.0 [sUCCEEDED]
. 2017.01.01 18:32:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.81.141/255.255.0.0 on interface {7818C367-76AE-4C0E-B200-02B6CBF89E22} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.01.01 18:32:09 - OpenVPN > Successful ARP Flush on interface [5] {7818C367-76AE-4C0E-B200-02B6CBF89E22}
. 2017.01.01 18:32:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.01 18:32:14 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:32:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:32:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:32:14 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 3
. 2017.01.01 18:32:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:32:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:32:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:32:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:32:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:32:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:32:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:32:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:32:14 - Starting Management Interface
. 2017.01.01 18:32:14 - OpenVPN > Initialization Sequence Completed
I 2017.01.01 18:32:14 - DNS of a network adapter forced (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:32:14 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2017.01.01 18:32:14 - Flushing DNS
I 2017.01.01 18:32:15 - Checking route
W 2017.01.01 18:33:05 - The operation has timed out
! 2017.01.01 18:33:05 - Disconnecting
. 2017.01.01 18:33:05 - Management - Send 'signal SIGTERM'
. 2017.01.01 18:33:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.01 18:33:05 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.01 18:33:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.01 18:33:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:33:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:33:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:33:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:33:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:10 - OpenVPN > Closing TUN/TAP interface
. 2017.01.01 18:33:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.01 18:33:10 - Connection terminated.
I 2017.01.01 18:33:10 - DNS of a network adapter restored to original settings (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:33:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2017.01.01 18:33:13 - Checking authorization ...
! 2017.01.01 18:33:13 - Connecting to Pleione (Netherlands, Alblasserdam)
. 2017.01.01 18:33:13 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2017.01.01 18:33:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2017.01.01 18:33:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.01 18:33:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.01 18:33:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:33:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:33:13 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2017.01.01 18:33:13 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.01 18:33:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.148:443
. 2017.01.01 18:33:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.148:443, sid=ba378a66 237ecc03
. 2017.01.01 18:33:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.01 18:33:13 - OpenVPN > Validating certificate key usage
. 2017.01.01 18:33:13 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.01 18:33:13 - OpenVPN > VERIFY KU OK
. 2017.01.01 18:33:13 - OpenVPN > Validating certificate extended key usage
. 2017.01.01 18:33:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.01 18:33:13 - OpenVPN > VERIFY EKU OK
. 2017.01.01 18:33:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.01.01 18:33:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:33:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:33:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:33:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:33:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.01 18:33:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.148:443
. 2017.01.01 18:33:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.01.01 18:33:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.81.141 255.255.0.0'
. 2017.01.01 18:33:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.01 18:33:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2017.01.01 18:33:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.01 18:33:18 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.01 18:33:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.01 18:33:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.01 18:33:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2017.01.01 18:33:18 - OpenVPN > open_tun, tt->ipv6=0
. 2017.01.01 18:33:19 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{7818C367-76AE-4C0E-B200-02B6CBF89E22}.tap
. 2017.01.01 18:33:19 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.01 18:33:19 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.81.141/255.255.0.0 [sUCCEEDED]
. 2017.01.01 18:33:19 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.81.141/255.255.0.0 on interface {7818C367-76AE-4C0E-B200-02B6CBF89E22} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.01.01 18:33:19 - OpenVPN > Successful ARP Flush on interface [5] {7818C367-76AE-4C0E-B200-02B6CBF89E22}
. 2017.01.01 18:33:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.01 18:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 3
. 2017.01.01 18:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:23 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:33:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:33:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:33:23 - Starting Management Interface
. 2017.01.01 18:33:23 - OpenVPN > Initialization Sequence Completed
I 2017.01.01 18:33:23 - DNS of a network adapter forced (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:33:23 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2017.01.01 18:33:23 - Flushing DNS
I 2017.01.01 18:33:23 - Checking route
W 2017.01.01 18:34:13 - The operation has timed out
! 2017.01.01 18:34:13 - Disconnecting
. 2017.01.01 18:34:13 - Management - Send 'signal SIGTERM'
. 2017.01.01 18:34:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.01 18:34:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.01 18:34:13 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.01 18:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:18 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:34:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:18 - OpenVPN > Closing TUN/TAP interface
. 2017.01.01 18:34:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.01 18:34:18 - Connection terminated.
I 2017.01.01 18:34:18 - DNS of a network adapter restored to original settings (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:34:18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2017.01.01 18:34:21 - Checking authorization ...
! 2017.01.01 18:34:21 - Connecting to Pleione (Netherlands, Alblasserdam)
. 2017.01.01 18:34:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2017.01.01 18:34:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2017.01.01 18:34:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.01 18:34:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.01 18:34:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:34:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:34:21 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2017.01.01 18:34:21 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.01 18:34:21 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.148:443
. 2017.01.01 18:34:21 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.148:443, sid=f290dca5 7337785a
. 2017.01.01 18:34:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.01 18:34:21 - OpenVPN > Validating certificate key usage
. 2017.01.01 18:34:21 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.01 18:34:21 - OpenVPN > VERIFY KU OK
. 2017.01.01 18:34:21 - OpenVPN > Validating certificate extended key usage
. 2017.01.01 18:34:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.01 18:34:21 - OpenVPN > VERIFY EKU OK
. 2017.01.01 18:34:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.01.01 18:34:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:34:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:34:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:34:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:34:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.01 18:34:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.148:443
. 2017.01.01 18:34:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.01.01 18:34:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.81.141 255.255.0.0'
. 2017.01.01 18:34:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.01 18:34:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2017.01.01 18:34:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.01 18:34:26 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.01 18:34:26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.01 18:34:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.01 18:34:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2017.01.01 18:34:26 - OpenVPN > open_tun, tt->ipv6=0
. 2017.01.01 18:34:26 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{7818C367-76AE-4C0E-B200-02B6CBF89E22}.tap
. 2017.01.01 18:34:26 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.01 18:34:26 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.81.141/255.255.0.0 [sUCCEEDED]
. 2017.01.01 18:34:26 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.81.141/255.255.0.0 on interface {7818C367-76AE-4C0E-B200-02B6CBF89E22} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.01.01 18:34:26 - OpenVPN > Successful ARP Flush on interface [5] {7818C367-76AE-4C0E-B200-02B6CBF89E22}
. 2017.01.01 18:34:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.01 18:34:31 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:34:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:34:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:31 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 3
. 2017.01.01 18:34:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:34:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:31 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:34:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:34:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:31 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:34:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:34:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:34:31 - Starting Management Interface
. 2017.01.01 18:34:31 - OpenVPN > Initialization Sequence Completed
I 2017.01.01 18:34:31 - DNS of a network adapter forced (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:34:31 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2017.01.01 18:34:31 - Flushing DNS
I 2017.01.01 18:34:31 - Checking route
W 2017.01.01 18:35:21 - The operation has timed out
! 2017.01.01 18:35:21 - Disconnecting
. 2017.01.01 18:35:21 - Management - Send 'signal SIGTERM'
. 2017.01.01 18:35:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.01 18:35:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.01 18:35:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.01 18:35:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:35:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:35:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:35:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:35:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:26 - OpenVPN > Closing TUN/TAP interface
. 2017.01.01 18:35:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.01 18:35:26 - Connection terminated.
I 2017.01.01 18:35:26 - DNS of a network adapter restored to original settings (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:35:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2017.01.01 18:35:26 - Cancel requested.
I 2017.01.01 18:35:26 - IPv6 restored.
! 2017.01.01 18:35:26 - Session terminated.
I 2017.01.01 18:35:30 - Session starting.
I 2017.01.01 18:35:30 - IPv6 disabled.
I 2017.01.01 18:35:30 - Checking authorization ...
! 2017.01.01 18:35:30 - Connecting to Pleione (Netherlands, Alblasserdam)
. 2017.01.01 18:35:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2017.01.01 18:35:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2017.01.01 18:35:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.01 18:35:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.01 18:35:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:35:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:35:30 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2017.01.01 18:35:30 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.01 18:35:30 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.148:443
. 2017.01.01 18:35:30 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.148:443, sid=dbae97d7 4b4d1f5a
. 2017.01.01 18:35:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.01 18:35:30 - OpenVPN > Validating certificate key usage
. 2017.01.01 18:35:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.01 18:35:30 - OpenVPN > VERIFY KU OK
. 2017.01.01 18:35:30 - OpenVPN > Validating certificate extended key usage
. 2017.01.01 18:35:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.01 18:35:30 - OpenVPN > VERIFY EKU OK
. 2017.01.01 18:35:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.01.01 18:35:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:35:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:35:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:35:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:35:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.01 18:35:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.148:443
. 2017.01.01 18:35:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.01.01 18:35:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.81.141 255.255.0.0'
. 2017.01.01 18:35:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.01 18:35:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2017.01.01 18:35:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.01 18:35:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.01 18:35:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.01 18:35:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.01 18:35:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2017.01.01 18:35:34 - OpenVPN > open_tun, tt->ipv6=0
. 2017.01.01 18:35:34 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{7818C367-76AE-4C0E-B200-02B6CBF89E22}.tap
. 2017.01.01 18:35:34 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.01 18:35:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.81.141/255.255.0.0 [sUCCEEDED]
. 2017.01.01 18:35:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.81.141/255.255.0.0 on interface {7818C367-76AE-4C0E-B200-02B6CBF89E22} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.01.01 18:35:34 - OpenVPN > Successful ARP Flush on interface [5] {7818C367-76AE-4C0E-B200-02B6CBF89E22}
. 2017.01.01 18:35:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.01 18:35:39 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:35:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:35:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:39 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 3
. 2017.01.01 18:35:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:35:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:35:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:35:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:35:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:35:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:35:39 - Starting Management Interface
. 2017.01.01 18:35:39 - OpenVPN > Initialization Sequence Completed
I 2017.01.01 18:35:39 - DNS of a network adapter forced (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:35:39 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2017.01.01 18:35:39 - Flushing DNS
I 2017.01.01 18:35:39 - Checking route
W 2017.01.01 18:36:29 - The operation has timed out
! 2017.01.01 18:36:29 - Disconnecting
. 2017.01.01 18:36:29 - Management - Send 'signal SIGTERM'
. 2017.01.01 18:36:29 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.01 18:36:29 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.01 18:36:29 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.01 18:36:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:36:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:36:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:36:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:34 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:36:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:34 - OpenVPN > Closing TUN/TAP interface
. 2017.01.01 18:36:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.01 18:36:34 - Connection terminated.
I 2017.01.01 18:36:34 - DNS of a network adapter restored to original settings (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:36:34 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2017.01.01 18:36:37 - Checking authorization ...
! 2017.01.01 18:36:37 - Connecting to Pleione (Netherlands, Alblasserdam)
. 2017.01.01 18:36:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2017.01.01 18:36:37 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2017.01.01 18:36:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.01 18:36:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.01 18:36:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:36:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:36:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2017.01.01 18:36:38 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.01 18:36:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.148:443
. 2017.01.01 18:36:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.148:443, sid=a3a72051 831395ae
. 2017.01.01 18:36:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.01 18:36:38 - OpenVPN > Validating certificate key usage
. 2017.01.01 18:36:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.01 18:36:38 - OpenVPN > VERIFY KU OK
. 2017.01.01 18:36:38 - OpenVPN > Validating certificate extended key usage
. 2017.01.01 18:36:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.01 18:36:38 - OpenVPN > VERIFY EKU OK
. 2017.01.01 18:36:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.01.01 18:36:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:36:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:36:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.01 18:36:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.01 18:36:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.01 18:36:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.148:443
. 2017.01.01 18:36:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.01.01 18:36:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.81.141 255.255.0.0'
. 2017.01.01 18:36:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.01 18:36:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2017.01.01 18:36:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.01 18:36:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.01 18:36:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.01 18:36:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.01 18:36:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2017.01.01 18:36:43 - OpenVPN > open_tun, tt->ipv6=0
. 2017.01.01 18:36:43 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{7818C367-76AE-4C0E-B200-02B6CBF89E22}.tap
. 2017.01.01 18:36:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.01 18:36:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.81.141/255.255.0.0 [sUCCEEDED]
. 2017.01.01 18:36:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.81.141/255.255.0.0 on interface {7818C367-76AE-4C0E-B200-02B6CBF89E22} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.01.01 18:36:43 - OpenVPN > Successful ARP Flush on interface [5] {7818C367-76AE-4C0E-B200-02B6CBF89E22}
. 2017.01.01 18:36:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.01 18:36:48 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:36:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:36:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:48 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 3
. 2017.01.01 18:36:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2017.01.01 18:36:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:36:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:36:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:36:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.01 18:36:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.01 18:36:48 - Starting Management Interface
. 2017.01.01 18:36:48 - OpenVPN > Initialization Sequence Completed
I 2017.01.01 18:36:48 - DNS of a network adapter forced (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:36:48 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2017.01.01 18:36:48 - Flushing DNS
I 2017.01.01 18:36:49 - Checking route
W 2017.01.01 18:37:39 - The operation has timed out
! 2017.01.01 18:37:39 - Disconnecting
. 2017.01.01 18:37:39 - Management - Send 'signal SIGTERM'
. 2017.01.01 18:37:39 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.01 18:37:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.01 18:37:39 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.01 18:37:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.148 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:37:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:37:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2017.01.01 18:37:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:37:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:37:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:37:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.01.01 18:37:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.01 18:37:44 - OpenVPN > Closing TUN/TAP interface
. 2017.01.01 18:37:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.01 18:37:44 - Connection terminated.
I 2017.01.01 18:37:44 - DNS of a network adapter restored to original settings (Intel® Centrino® Ultimate-N 6300 AGN)
I 2017.01.01 18:37:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2017.01.01 18:37:44 - Cancel requested.
I 2017.01.01 18:37:44 - IPv6 restored.
! 2017.01.01 18:37:44 - Session terminated.
! 2017.01.01 18:37:47 - Deactivation of Network Lock
 

...............................................................................

 

I uninstalled AirVPN and OpenVPN and reinstalled both of them.
I have the versions:

airvpn_windows8_x64_installer and
openvpn-install-2.4.0-I601

Please help me!
It functioned yesterday until 3pm

Share this post


Link to post

That's better.

 

Try go to your Control Panel>Network Connections>Change Adapter Settings>Click each adapter and go to its properties>Untick IPv6>Click ok.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hi,

 

I have already done this.

 

Hello,

I have installed also the new beta version. It still does not function. I also tried it with a different router at a different place.
I'm not able to establish a connection. I attach the log file:


I 2017.01.02 09:21:32 - Eddie client version: 2.11.9 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.10240.0, Mono/.Net Framework: v4.0.30319
. 2017.01.02 09:21:32 - Reading options from C:\Users\Murat Topcu\AppData\Local\AirVPN\AirVPN.xml
. 2017.01.02 09:21:32 - Data path: C:\Users\Murat Topcu\AppData\Local\AirVPN
. 2017.01.02 09:21:32 - Application path: C:\Program Files\AirVPN
. 2017.01.02 09:21:32 - Executable path: C:\Program Files\AirVPN\AirVPN.exe
. 2017.01.02 09:21:32 - Command line arguments (1): path="home"
. 2017.01.02 09:21:32 - Operating System: Microsoft Windows NT 10.0.10240.0
I 2017.01.02 09:21:32 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2017.01.02 09:21:32 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)
I 2017.01.02 09:21:32 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2017.01.02 09:21:32 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)
! 2017.01.02 09:21:32 - Ready
. 2017.01.02 09:21:32 - Updating systems & servers data ...
. 2017.01.02 09:21:33 - Systems & servers data update completed
I 2017.01.02 09:21:36 - Checking login ...
! 2017.01.02 09:21:37 - Logged in.
! 2017.01.02 09:21:40 - Activation of Network Lock - Windows Filtering Platform
I 2017.01.02 09:21:47 - Session starting.
. 2017.01.02 09:21:55 - IPv6 disabled with packet filtering.
I 2017.01.02 09:22:16 - Checking authorization ...
! 2017.01.02 09:22:16 - Connecting to Mirach (Netherlands, Alblasserdam)
! 2017.01.02 09:22:54 - Disconnecting
. 2017.01.02 09:22:54 - Connection terminated.
I 2017.01.02 09:22:57 - Checking authorization ...
! 2017.01.02 09:22:57 - Connecting to Mirach (Netherlands, Alblasserdam)
! 2017.01.02 09:23:34 - Disconnecting
. 2017.01.02 09:23:34 - Connection terminated.
I 2017.01.02 09:23:37 - Checking authorization ...
! 2017.01.02 09:23:37 - Connecting to Mirach (Netherlands, Alblasserdam)
. 2017.01.02 09:23:51 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2017.01.02 09:23:51 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.01.02 09:23:51 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
. 2017.01.02 09:23:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.02 09:23:51 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
. 2017.01.02 09:23:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.02 09:23:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.02 09:23:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:23:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:23:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.01.02 09:23:51 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.02 09:23:51 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.68:443
. 2017.01.02 09:23:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:23:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:23:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.01.02 09:23:51 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.02 09:23:51 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.68:443
. 2017.01.02 09:23:51 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2017.01.02 09:23:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.02 09:23:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2017.01.02 09:23:51 - Disconnecting
. 2017.01.02 09:23:51 - Connection terminated.
I 2017.01.02 09:23:54 - Checking authorization ...
! 2017.01.02 09:23:55 - Connecting to Albali (Sweden, Uppsala)
. 2017.01.02 09:23:55 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2017.01.02 09:23:55 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.01.02 09:23:55 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
. 2017.01.02 09:23:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.02 09:23:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.02 09:23:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:23:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:23:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.01.02 09:23:55 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.02 09:23:55 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.149:443
. 2017.01.02 09:24:27 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2017.01.02 09:24:27 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.02 09:24:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2017.01.02 09:24:33 - Disconnecting
. 2017.01.02 09:24:33 - Connection terminated.
I 2017.01.02 09:24:36 - Checking authorization ...
! 2017.01.02 09:24:36 - Connecting to Mirach (Netherlands, Alblasserdam)
. 2017.01.02 09:24:36 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2017.01.02 09:24:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.01.02 09:24:36 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
. 2017.01.02 09:24:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.02 09:24:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.02 09:24:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:24:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 09:24:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.01.02 09:24:36 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.02 09:24:36 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.68:443


Best wishes

Share this post


Link to post

! 2017.01.02 09:22:57 - Connecting to Mirach (Netherlands, Alblasserdam)

! 2017.01.02 09:23:34 - Disconnecting

[...]

. 2017.01.02 09:23:55 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.149:443

. 2017.01.02 09:24:27 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting

 

Hello,

 

something is blocking UDP, please check any packet filtering tool in your system and router. If you find nothing blocking then your ISP can be culprit, switch to TCP.

 

Kind regards

Share this post


Link to post

Same problem here.

I 2017.01.02 13:22:00 - Eddie client version: 2.11.9 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319
. 2017.01.02 13:22:00 - Reading options from C:\Users\omegart\Desktop\airvpn2.11\AirVPN.xml
. 2017.01.02 13:22:00 - Data path: C:\Users\omegart\Desktop\airvpn2.11
. 2017.01.02 13:22:00 - Application path: C:\Users\omegart\Desktop\airvpn2.11
. 2017.01.02 13:22:00 - Executable path: C:\Users\omegart\Desktop\airvpn2.11\AirVPN.exe
. 2017.01.02 13:22:00 - Command line arguments (0):
. 2017.01.02 13:22:00 - Operating System: Microsoft Windows NT 10.0.14393.0
I 2017.01.02 13:22:00 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2017.01.02 13:22:00 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09 (C:\Users\omegart\Desktop\airvpn2.11\openvpn.exe)
I 2017.01.02 13:22:00 - SSH - Version: plink 0.67 (C:\Users\omegart\Desktop\airvpn2.11\plink.exe)
I 2017.01.02 13:22:00 - SSL - Version: stunnel 5.37 (C:\Users\omegart\Desktop\airvpn2.11\stunnel.exe)
! 2017.01.02 13:22:00 - Activation of Network Lock - Windows Firewall
! 2017.01.02 13:22:02 - Ready
. 2017.01.02 13:22:02 - Updating systems & servers data ...
. 2017.01.02 13:22:02 - Systems & servers data update completed
I 2017.01.02 13:22:05 - Session starting.
. 2017.01.02 13:22:05 - IPv6 disabled with packet filtering.
I 2017.01.02 13:22:07 - Checking authorization ...
! 2017.01.02 13:22:07 - Connecting to Matar (Netherlands, Alblasserdam)
. 2017.01.02 13:22:08 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016
. 2017.01.02 13:22:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.01.02 13:22:08 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.02 13:22:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.02 13:22:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2017.01.02 13:22:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 13:22:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 13:22:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.01.02 13:22:08 - OpenVPN > UDPv4 link local: [undef]
. 2017.01.02 13:22:08 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.137:443
. 2017.01.02 13:22:08 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.137:443, sid=203d1b14 56fdf093
. 2017.01.02 13:22:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.02 13:22:08 - OpenVPN > Validating certificate key usage
. 2017.01.02 13:22:08 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.02 13:22:08 - OpenVPN > VERIFY KU OK
. 2017.01.02 13:22:08 - OpenVPN > Validating certificate extended key usage
. 2017.01.02 13:22:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.02 13:22:08 - OpenVPN > VERIFY EKU OK
. 2017.01.02 13:22:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.01.02 13:22:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.02 13:22:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 13:22:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.02 13:22:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.02 13:22:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.02 13:22:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.137:443
. 2017.01.02 13:22:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.01.02 13:22:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.96.222 255.255.0.0'
. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.02 13:22:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=a4:34:d9:37:18:fb
. 2017.01.02 13:22:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2017.01.02 13:22:11 - OpenVPN > open_tun, tt->ipv6=0
. 2017.01.02 13:22:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9}.tap
. 2017.01.02 13:22:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.02 13:22:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.96.222/255.255.0.0 [sUCCEEDED]
. 2017.01.02 13:22:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.96.222/255.255.0.0 on interface {D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.01.02 13:22:11 - OpenVPN > Successful ARP Flush on interface [33] {D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9}
. 2017.01.02 13:22:16 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:16 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:21 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:21 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:23 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:23 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:24 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:24 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:25 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:25 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:26 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:28 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:28 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:28 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:29 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:29 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:30 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:30 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:30 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:31 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:31 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:33 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:33 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:34 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:34 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:35 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:35 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:35 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:36 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:36 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:36 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:37 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:37 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:38 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:38 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:38 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:40 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:41 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:42 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:43 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:43 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:43 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2017.01.02 13:22:44 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2017.01.02 13:22:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
. 2017.01.02 13:22:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.137 MASK 255.255.255.255 192.168.1.1
. 2017.01.02 13:22:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2017.01.02 13:22:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.02 13:22:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2017.01.02 13:22:46 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2017.01.02 13:22:46 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2017.01.02 13:22:46 - OpenVPN > Route addition fallback to route.exe
. 2017.01.02 13:22:46 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2017.01.02 13:22:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2017.01.02 13:22:46 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2017.01.02 13:22:46 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2017.01.02 13:22:46 - OpenVPN > Route addition fallback to route.exe
. 2017.01.02 13:22:46 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2017.01.02 13:22:46 - OpenVPN > SYSTEM ROUTING TABLE
. 2017.01.02 13:22:46 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.1.1 p=0 i=10 t=4 pr=3 a=71 h=0 m=55/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=10 t=4 pr=3 a=0 h=0 m=56/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 109.232.227.137 255.255.255.255 192.168.1.1 p=0 i=10 t=4 pr=3 a=0 h=0 m=55/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=10 t=4 pr=3 a=0 h=0 m=56/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 169.254.0.0 255.255.0.0 169.254.19.46 p=0 i=33 t=3 pr=2 a=240 h=0 m=291/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 169.254.19.46 255.255.255.255 169.254.19.46 p=0 i=33 t=3 pr=2 a=240 h=0 m=291/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 169.254.255.255 255.255.255.255 169.254.19.46 p=0 i=33 t=3 pr=2 a=240 h=0 m=291/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 192.168.1.0 255.255.255.0 192.168.1.106 p=0 i=10 t=3 pr=2 a=71 h=0 m=311/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 192.168.1.106 255.255.255.255 192.168.1.106 p=0 i=10 t=3 pr=2 a=71 h=0 m=311/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 192.168.1.255 255.255.255.255 192.168.1.106 p=0 i=10 t=3 pr=2 a=71 h=0 m=311/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 192.168.56.0 255.255.255.0 192.168.56.1 p=0 i=13 t=3 pr=2 a=5 h=0 m=281/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 192.168.56.1 255.255.255.255 192.168.56.1 p=0 i=13 t=3 pr=2 a=5 h=0 m=281/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 192.168.56.255 255.255.255.255 192.168.56.1 p=0 i=13 t=3 pr=2 a=5 h=0 m=281/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 169.254.19.46 p=0 i=33 t=3 pr=2 a=250 h=0 m=291/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.1.106 p=0 i=10 t=3 pr=2 a=86 h=0 m=311/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.56.1 p=0 i=13 t=3 pr=2 a=9 h=0 m=281/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 169.254.19.46 p=0 i=33 t=3 pr=2 a=250 h=0 m=291/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.1.106 p=0 i=10 t=3 pr=2 a=86 h=0 m=311/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.56.1 p=0 i=13 t=3 pr=2 a=9 h=0 m=281/0/0/0/0
. 2017.01.02 13:22:46 - OpenVPN > SYSTEM ADAPTER LIST
. 2017.01.02 13:22:46 - OpenVPN > VirtualBox Host-Only Ethernet Adapter
. 2017.01.02 13:22:46 - OpenVPN >   Index = 13
. 2017.01.02 13:22:46 - OpenVPN >   GUID = {B2FEDBB7-701F-401F-8731-70FE7C93E974}
. 2017.01.02 13:22:46 - OpenVPN >   IP = 192.168.56.1/255.255.255.0
. 2017.01.02 13:22:46 - OpenVPN >   MAC = 0a:00:27:00:00:0d
. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV =
. 2017.01.02 13:22:46 - OpenVPN > TAP-Windows Adapter V9
. 2017.01.02 13:22:46 - OpenVPN >   Index = 33
. 2017.01.02 13:22:46 - OpenVPN >   GUID = {D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9}
. 2017.01.02 13:22:46 - OpenVPN >   IP = 169.254.19.46/255.255.0.0
. 2017.01.02 13:22:46 - OpenVPN >   MAC = 00:ff:d5:cc:cd:fc
. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2017.01.02 13:22:46 - OpenVPN >   DHCP SERV = 0.0.0.0/255.255.255.255
. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE OBTAINED = Mon Jan 02 13:22:46 2017
. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE EXPIRES  = Mon Jan 02 13:22:46 2017
. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV =
. 2017.01.02 13:22:46 - OpenVPN > Intel® Dual Band Wireless-AC 8260
. 2017.01.02 13:22:46 - OpenVPN >   Index = 10
. 2017.01.02 13:22:46 - OpenVPN >   GUID = {553FFDCA-4ED2-45FF-83A4-A8BEADDAABD8}
. 2017.01.02 13:22:46 - OpenVPN >   IP = 192.168.1.106/255.255.255.0
. 2017.01.02 13:22:46 - OpenVPN >   MAC = a4:34:d9:37:18:fb
. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 192.168.1.1/255.255.255.255
. 2017.01.02 13:22:46 - OpenVPN >   DHCP SERV = 192.168.1.1/255.255.255.255
. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE OBTAINED = Mon Jan 02 13:21:38 2017
. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE EXPIRES  = Mon Jan 02 19:21:38 2017
. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV = 192.168.1.1/255.255.255.255
. 2017.01.02 13:22:46 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter #4
. 2017.01.02 13:22:46 - OpenVPN >   Index = 8
. 2017.01.02 13:22:46 - OpenVPN >   GUID = {4CC8FFF6-9B18-43C8-BA5C-A79FACC69A57}
. 2017.01.02 13:22:46 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2017.01.02 13:22:46 - OpenVPN >   MAC = a4:34:d9:37:18:fc
. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2017.01.02 13:22:46 - OpenVPN >   DHCP SERV =
. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE OBTAINED = Mon Jan 02 13:22:46 2017
. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE EXPIRES  = Mon Jan 02 13:22:46 2017
. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV =
. 2017.01.02 13:22:46 - Starting Management Interface
. 2017.01.02 13:22:46 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
. 2017.01.02 13:22:46 - DNS leak protection with packet filtering enabled.
! 2017.01.02 13:22:46 - Disconnecting
. 2017.01.02 13:22:46 - Management - Send 'signal SIGTERM'
. 2017.01.02 13:22:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.02 13:22:46 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 8260, from automatic (192.168.1.1,192.168.1.1) to 10.4.0.1)
I 2017.01.02 13:22:46 - Flushing DNS
. 2017.01.02 13:22:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.02 13:22:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.02 13:22:46 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.02 13:22:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.137 MASK 255.255.255.255 192.168.1.1
. 2017.01.02 13:22:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.02 13:22:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2017.01.02 13:22:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2017.01.02 13:22:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2017.01.02 13:22:52 - OpenVPN > Route deletion fallback to route.exe
. 2017.01.02 13:22:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2017.01.02 13:22:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2017.01.02 13:22:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2017.01.02 13:22:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2017.01.02 13:22:52 - OpenVPN > Route deletion fallback to route.exe
. 2017.01.02 13:22:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2017.01.02 13:22:52 - OpenVPN > Closing TUN/TAP interface
. 2017.01.02 13:22:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.02 13:22:52 - Connection terminated.
. 2017.01.02 13:22:52 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 8260, to automatic)
. 2017.01.02 13:22:52 - DNS leak protection with packet filtering disabled.
I 2017.01.02 13:22:52 - Cancel requested.
. 2017.01.02 13:22:52 - IPv6 restored with packet filtering.
! 2017.01.02 13:22:52 - Session terminated.
! 2017.01.02 13:22:58 - Deactivation of Network Lock

 

I've already tried disabling adapter I don't use (virtualbox), disabling ipv6, always connected media in tap driver, disable and re-enalbe tap adapter, previous tap driver version (9.9.2_3).

I use eset av and the whole airvpn folder is in the exclusion list.

I'm using 2.11 right now, because first I tried with 2.10 but I had the same issues.

Network lock is set to windows firewall because I needed to overwrite my strict rules to get program communitcating online.

Also I've tried ssl protocol instead of auto but with no luck.

Thanks.

Share this post


Link to post

@omegart

 

Try this: remove ESET completely from your system and test again. In any case, if you decide to not remove it, do NOT use Network Lock with Windows Firewall. You can't run two competing firewalls in a system.

 

Kind regards

Share this post


Link to post

Same problem here.

I 2017.01.02 13:22:00 - Eddie client version: 2.11.9 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319

. 2017.01.02 13:22:00 - Reading options from C:\Users\omegart\Desktop\airvpn2.11\AirVPN.xml

. 2017.01.02 13:22:00 - Data path: C:\Users\omegart\Desktop\airvpn2.11

. 2017.01.02 13:22:00 - Application path: C:\Users\omegart\Desktop\airvpn2.11

. 2017.01.02 13:22:00 - Executable path: C:\Users\omegart\Desktop\airvpn2.11\AirVPN.exe

. 2017.01.02 13:22:00 - Command line arguments (0):

. 2017.01.02 13:22:00 - Operating System: Microsoft Windows NT 10.0.14393.0

I 2017.01.02 13:22:00 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2

I 2017.01.02 13:22:00 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09 (C:\Users\omegart\Desktop\airvpn2.11\openvpn.exe)

I 2017.01.02 13:22:00 - SSH - Version: plink 0.67 (C:\Users\omegart\Desktop\airvpn2.11\plink.exe)

I 2017.01.02 13:22:00 - SSL - Version: stunnel 5.37 (C:\Users\omegart\Desktop\airvpn2.11\stunnel.exe)

! 2017.01.02 13:22:00 - Activation of Network Lock - Windows Firewall

! 2017.01.02 13:22:02 - Ready

. 2017.01.02 13:22:02 - Updating systems & servers data ...

. 2017.01.02 13:22:02 - Systems & servers data update completed

I 2017.01.02 13:22:05 - Session starting.

. 2017.01.02 13:22:05 - IPv6 disabled with packet filtering.

I 2017.01.02 13:22:07 - Checking authorization ...

! 2017.01.02 13:22:07 - Connecting to Matar (Netherlands, Alblasserdam)

. 2017.01.02 13:22:08 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016

. 2017.01.02 13:22:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.02 13:22:08 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.02 13:22:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.02 13:22:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2017.01.02 13:22:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.02 13:22:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.02 13:22:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.02 13:22:08 - OpenVPN > UDPv4 link local: [undef]

. 2017.01.02 13:22:08 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.137:443

. 2017.01.02 13:22:08 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.137:443, sid=203d1b14 56fdf093

. 2017.01.02 13:22:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.02 13:22:08 - OpenVPN > Validating certificate key usage

. 2017.01.02 13:22:08 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.02 13:22:08 - OpenVPN > VERIFY KU OK

. 2017.01.02 13:22:08 - OpenVPN > Validating certificate extended key usage

. 2017.01.02 13:22:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.02 13:22:08 - OpenVPN > VERIFY EKU OK

. 2017.01.02 13:22:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.02 13:22:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.02 13:22:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.02 13:22:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.02 13:22:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.02 13:22:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.02 13:22:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.137:443

. 2017.01.02 13:22:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.02 13:22:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.96.222 255.255.0.0'

. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.02 13:22:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.02 13:22:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=10 HWADDR=a4:34:d9:37:18:fb

. 2017.01.02 13:22:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2017.01.02 13:22:11 - OpenVPN > open_tun, tt->ipv6=0

. 2017.01.02 13:22:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9}.tap

. 2017.01.02 13:22:11 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.02 13:22:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.96.222/255.255.0.0 [sUCCEEDED]

. 2017.01.02 13:22:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.96.222/255.255.0.0 on interface {D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.02 13:22:11 - OpenVPN > Successful ARP Flush on interface [33] {D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9}

. 2017.01.02 13:22:16 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:16 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:21 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:21 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:23 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:23 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:24 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:24 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:25 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:25 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:26 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:28 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:28 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:28 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:29 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:29 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:30 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:30 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:30 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:31 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:31 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:33 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:33 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:34 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:34 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:35 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:35 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:35 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:36 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:36 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:36 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:37 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:37 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:38 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:38 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:38 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:40 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:41 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:42 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:43 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:43 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:43 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

. 2017.01.02 13:22:44 - Eddie Windows Interface Hack executed (Ethernet 2)

. 2017.01.02 13:22:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.137 MASK 255.255.255.255 192.168.1.1

. 2017.01.02 13:22:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4

. 2017.01.02 13:22:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.02 13:22:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

W 2017.01.02 13:22:46 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1

. 2017.01.02 13:22:46 - OpenVPN > Route addition via IPAPI failed [adaptive]

. 2017.01.02 13:22:46 - OpenVPN > Route addition fallback to route.exe

. 2017.01.02 13:22:46 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2017.01.02 13:22:46 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

W 2017.01.02 13:22:46 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1

. 2017.01.02 13:22:46 - OpenVPN > Route addition via IPAPI failed [adaptive]

. 2017.01.02 13:22:46 - OpenVPN > Route addition fallback to route.exe

. 2017.01.02 13:22:46 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2017.01.02 13:22:46 - OpenVPN > SYSTEM ROUTING TABLE

. 2017.01.02 13:22:46 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.1.1 p=0 i=10 t=4 pr=3 a=71 h=0 m=55/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=10 t=4 pr=3 a=0 h=0 m=56/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 109.232.227.137 255.255.255.255 192.168.1.1 p=0 i=10 t=4 pr=3 a=0 h=0 m=55/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=10 t=4 pr=3 a=0 h=0 m=56/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 169.254.0.0 255.255.0.0 169.254.19.46 p=0 i=33 t=3 pr=2 a=240 h=0 m=291/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 169.254.19.46 255.255.255.255 169.254.19.46 p=0 i=33 t=3 pr=2 a=240 h=0 m=291/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 169.254.255.255 255.255.255.255 169.254.19.46 p=0 i=33 t=3 pr=2 a=240 h=0 m=291/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 192.168.1.0 255.255.255.0 192.168.1.106 p=0 i=10 t=3 pr=2 a=71 h=0 m=311/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 192.168.1.106 255.255.255.255 192.168.1.106 p=0 i=10 t=3 pr=2 a=71 h=0 m=311/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 192.168.1.255 255.255.255.255 192.168.1.106 p=0 i=10 t=3 pr=2 a=71 h=0 m=311/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 192.168.56.0 255.255.255.0 192.168.56.1 p=0 i=13 t=3 pr=2 a=5 h=0 m=281/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 192.168.56.1 255.255.255.255 192.168.56.1 p=0 i=13 t=3 pr=2 a=5 h=0 m=281/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 192.168.56.255 255.255.255.255 192.168.56.1 p=0 i=13 t=3 pr=2 a=5 h=0 m=281/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 169.254.19.46 p=0 i=33 t=3 pr=2 a=250 h=0 m=291/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.1.106 p=0 i=10 t=3 pr=2 a=86 h=0 m=311/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.56.1 p=0 i=13 t=3 pr=2 a=9 h=0 m=281/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=4401 h=0 m=331/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 169.254.19.46 p=0 i=33 t=3 pr=2 a=250 h=0 m=291/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.1.106 p=0 i=10 t=3 pr=2 a=86 h=0 m=311/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.56.1 p=0 i=13 t=3 pr=2 a=9 h=0 m=281/0/0/0/0

. 2017.01.02 13:22:46 - OpenVPN > SYSTEM ADAPTER LIST

. 2017.01.02 13:22:46 - OpenVPN > VirtualBox Host-Only Ethernet Adapter

. 2017.01.02 13:22:46 - OpenVPN >   Index = 13

. 2017.01.02 13:22:46 - OpenVPN >   GUID = {B2FEDBB7-701F-401F-8731-70FE7C93E974}

. 2017.01.02 13:22:46 - OpenVPN >   IP = 192.168.56.1/255.255.255.0

. 2017.01.02 13:22:46 - OpenVPN >   MAC = 0a:00:27:00:00:0d

. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255

. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV =

. 2017.01.02 13:22:46 - OpenVPN > TAP-Windows Adapter V9

. 2017.01.02 13:22:46 - OpenVPN >   Index = 33

. 2017.01.02 13:22:46 - OpenVPN >   GUID = {D5CCCDFC-37D9-46F3-9FD1-A372ED352DA9}

. 2017.01.02 13:22:46 - OpenVPN >   IP = 169.254.19.46/255.255.0.0

. 2017.01.02 13:22:46 - OpenVPN >   MAC = 00:ff:d5:cc:cd:fc

. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255

. 2017.01.02 13:22:46 - OpenVPN >   DHCP SERV = 0.0.0.0/255.255.255.255

. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE OBTAINED = Mon Jan 02 13:22:46 2017

. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE EXPIRES  = Mon Jan 02 13:22:46 2017

. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV =

. 2017.01.02 13:22:46 - OpenVPN > Intel® Dual Band Wireless-AC 8260

. 2017.01.02 13:22:46 - OpenVPN >   Index = 10

. 2017.01.02 13:22:46 - OpenVPN >   GUID = {553FFDCA-4ED2-45FF-83A4-A8BEADDAABD8}

. 2017.01.02 13:22:46 - OpenVPN >   IP = 192.168.1.106/255.255.255.0

. 2017.01.02 13:22:46 - OpenVPN >   MAC = a4:34:d9:37:18:fb

. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 192.168.1.1/255.255.255.255

. 2017.01.02 13:22:46 - OpenVPN >   DHCP SERV = 192.168.1.1/255.255.255.255

. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE OBTAINED = Mon Jan 02 13:21:38 2017

. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE EXPIRES  = Mon Jan 02 19:21:38 2017

. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV = 192.168.1.1/255.255.255.255

. 2017.01.02 13:22:46 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter #4

. 2017.01.02 13:22:46 - OpenVPN >   Index = 8

. 2017.01.02 13:22:46 - OpenVPN >   GUID = {4CC8FFF6-9B18-43C8-BA5C-A79FACC69A57}

. 2017.01.02 13:22:46 - OpenVPN >   IP = 0.0.0.0/0.0.0.0

. 2017.01.02 13:22:46 - OpenVPN >   MAC = a4:34:d9:37:18:fc

. 2017.01.02 13:22:46 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255

. 2017.01.02 13:22:46 - OpenVPN >   DHCP SERV =

. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE OBTAINED = Mon Jan 02 13:22:46 2017

. 2017.01.02 13:22:46 - OpenVPN >   DHCP LEASE EXPIRES  = Mon Jan 02 13:22:46 2017

. 2017.01.02 13:22:46 - OpenVPN >   DNS SERV =

. 2017.01.02 13:22:46 - Starting Management Interface

. 2017.01.02 13:22:46 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )

. 2017.01.02 13:22:46 - DNS leak protection with packet filtering enabled.

! 2017.01.02 13:22:46 - Disconnecting

. 2017.01.02 13:22:46 - Management - Send 'signal SIGTERM'

. 2017.01.02 13:22:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.02 13:22:46 - DNS of a network adapter forced (Intel® Dual Band Wireless-AC 8260, from automatic (192.168.1.1,192.168.1.1) to 10.4.0.1)

I 2017.01.02 13:22:46 - Flushing DNS

. 2017.01.02 13:22:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.01.02 13:22:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.02 13:22:46 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.02 13:22:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.137 MASK 255.255.255.255 192.168.1.1

. 2017.01.02 13:22:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.02 13:22:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

W 2017.01.02 13:22:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1

. 2017.01.02 13:22:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]

. 2017.01.02 13:22:52 - OpenVPN > Route deletion fallback to route.exe

. 2017.01.02 13:22:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2017.01.02 13:22:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

W 2017.01.02 13:22:52 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1

. 2017.01.02 13:22:52 - OpenVPN > Route deletion via IPAPI failed [adaptive]

. 2017.01.02 13:22:52 - OpenVPN > Route deletion fallback to route.exe

. 2017.01.02 13:22:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

. 2017.01.02 13:22:52 - OpenVPN > Closing TUN/TAP interface

. 2017.01.02 13:22:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.02 13:22:52 - Connection terminated.

. 2017.01.02 13:22:52 - DNS of a network adapter restored to original settings (Intel® Dual Band Wireless-AC 8260, to automatic)

. 2017.01.02 13:22:52 - DNS leak protection with packet filtering disabled.

I 2017.01.02 13:22:52 - Cancel requested.

. 2017.01.02 13:22:52 - IPv6 restored with packet filtering.

! 2017.01.02 13:22:52 - Session terminated.

! 2017.01.02 13:22:58 - Deactivation of Network Lock

 

I've already tried disabling adapter I don't use (virtualbox), disabling ipv6, always connected media in tap driver, disable and re-enalbe tap adapter, previous tap driver version (9.9.2_3).

I use eset av and the whole airvpn folder is in the exclusion list.

I'm using 2.11 right now, because first I tried with 2.10 but I had the same issues.

Network lock is set to windows firewall because I needed to overwrite my strict rules to get program communitcating online.

Also I've tried ssl protocol instead of auto but with no luck.

Thanks.

. 2017.01.02 13:22:16 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down

. 2017.01.02 13:22:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

Control panel>>Networking>>Change Adapter Settings>>TAP adapter properties>>Advanced>>Change Media Status to "Always Connected">>Click Apply. Otherwise restart it or select application controlled.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

@omegart

 

Try this: remove ESET completely from your system and test again. In any case, if you decide to not remove it, do NOT use Network Lock with Windows Firewall. You can't run two competing firewalls in a system.

 

Kind regards

 

​Going to try a clean boot, next eset uninstallation.

​However, eset antivirus doesn't include a firewall solution, only internet security product does.

​And, If I leave Network Lock in automatic mode it doesn't overwrite windows firewall rules and the program goes in timeout during the connection to any server (obviously because the communication is not allowed in the outbound rules).

​Control panel>>Networking>>Change Adapter Settings>>TAP adapter properties>>Advanced>>Change Media Status to "Always Connected">>Click Apply. Otherwise restart it or select application controlled.

 

​As I said before, I've already tried with no luck.

Share this post


Link to post

Yes you may !

 

Only really .Net I think.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

.net is a framework, not a service..

​However, is normal that while trying to put up the tap device if i check the status i see no gateway and no dns address? It's because the interface hasn't been discovered yet?

Share this post


Link to post

I know and I had actually imagined you would say that lol - to which I then tell you that for all I know, you may be using the word "service" as a catch-all term for anything related to Windows, which Eddie may need .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hello,

I have solved my problem.

Windows Firewall with Advanced Security

Inbound Rules

Name                 AirVPN TCP
Group
Profile                All
Enabled                Yes
Action                Allow
Override            No
Program                %ProgramFiles%\AirVPN\AirVPN.exe
Local Address            Any
Remote Address            Any
Protocol            TCP
Local Port            443
Remote Port            Any
Authorized Users        Any
Authorized Computers        Any
Authorized Local Principals    Any
Local User Owner        Any
Application Package        Any

Best wishes

Share this post


Link to post

So I've found my problem too.

 

I haven't added any exception to windows firewall rules for including airvpn and openvpn inbound and outbound connection because I tought: 'If network lock is going to overwrite windows firewall rules to allow connections to go only through the client, the client itself would be enable to communicate to the internet.'

 

The problem is that the client itself is not added to firewall exception as i thought, only bunch of address were, so the problem was that the TAP interface couldn't come up because it didn't get any ip address.

 

I had to add firewall exclusion for airvpn (IN) and both air and openvpn (OUT), then, I first had to connect without network lock, disconnect, activate network lock and reconnect, this way it works out.

 

 

An OT question: there is a way to edit network lock setting so I can enable only my web browser to go outside and block every other network connection? Thanks.

Share this post


Link to post

So like...you folks that are having firewall issues, are you forcing Eddie to use the Windows Firewall Network Lock method instead of the WFP method?  If you are using WFP, it may not be manipulating the firewall at all.  If you switch to Firewall method, you may find that it writes the correct rules for you.

Share this post


Link to post

An OT question: there is a way to edit network lock setting so I can enable only my web browser to go outside and block every other network connection? Thanks.

 

It works with IPs, not with applications.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

 

It works with IPs, not with applications.

 Because of this I asked if there is a way to edit rules that are going to overwrite the firewall ones.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...