Jump to content
Not connected, Your IP: 3.136.19.254
Sign in to follow this  
greenclaydog

Network Lock breaks sharing VPN over WiFi

Recommended Posts

So, i have attempted to use just about any hotspot software i can get my hands on, however it would seem the Network Lock prevents all hotspot software from communicating with their clients. The only way i can get it to work is if i turn off Network Lock.

 

Capture.png

 

 

 

 

I don't think my logs will be of any use here but since they are practically obligatory here they are

 

I 2017.01.06 19:01:22 - Eddie client version: 2.11.10 / windows_x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net Framework: v2.0.50727
. 2017.01.06 19:01:22 - Reading options from C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\AirVPN.xml
. 2017.01.06 19:01:24 - Data path: C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN
. 2017.01.06 19:01:24 - Application path: C:\Program Files\AirVPN
. 2017.01.06 19:01:24 - Executable path: C:\Program Files\AirVPN\AirVPN.exe
. 2017.01.06 19:01:24 - Command line arguments (1): path="home"
. 2017.01.06 19:01:24 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
I 2017.01.06 19:01:28 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2017.01.06 19:01:28 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)
I 2017.01.06 19:01:28 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2017.01.06 19:01:28 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)
! 2017.01.06 19:01:31 - Activation of Network Lock - Windows Filtering Platform
. 2017.01.06 19:01:31 - Updating systems & servers data ...
I 2017.01.06 19:01:31 - Session starting.
. 2017.01.06 19:01:31 - IPv6 disabled with packet filtering.
I 2017.01.06 19:01:31 - Checking authorization ...
W 2017.01.06 19:01:31 - Authorization check failed, continue anyway ({1])
. 2017.01.06 19:01:31 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (Unable to connect to the remote server)
! 2017.01.06 19:01:32 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:01:32 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:01:32 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:01:32 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:01:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:01:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:01:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:01:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:01:33 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:01:33 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:01:33 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:01:40 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=97ada8f2 4561ce32
. 2017.01.06 19:01:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:01:40 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:01:40 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:01:40 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:01:40 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:01:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:01:40 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:01:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:01:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:01:41 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:01:42 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:01:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:01:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:01:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:01:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:01:42 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:01:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:01:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:01:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:01:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:01:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:01:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:01:42 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:01:42 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:01:42 - OpenVPN > open_tun
. 2017.01.06 19:01:42 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:01:42 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:01:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:01:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:01:42 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:01:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:01:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:01:48 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:01:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:01:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:01:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:01:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:01:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:01:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:01:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:01:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:01:48 - Starting Management Interface
. 2017.01.06 19:01:48 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:01:48 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:01:49 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:01:49 - Flushing DNS
I 2017.01.06 19:01:56 - Checking DNS
! 2017.01.06 19:01:58 - Connected.
. 2017.01.06 19:01:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:01:58 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2017.01.06 19:08:03 - Disconnecting
. 2017.01.06 19:08:03 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:08:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:08:03 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:08:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:08:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:08:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:08:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:08:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:08:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:08:08 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:08:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:08:08 - Connection terminated.
. 2017.01.06 19:08:08 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:08:08 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:08:08 - IPv6 restored with packet filtering.
. 2017.01.06 19:08:08 - Flushing DNS
! 2017.01.06 19:08:15 - Session terminated.
I 2017.01.06 19:08:15 - Session starting.
. 2017.01.06 19:08:15 - IPv6 disabled with packet filtering.
I 2017.01.06 19:08:15 - Checking authorization ...
! 2017.01.06 19:08:16 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:08:41 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:08:41 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:08:41 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:08:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:08:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:08:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:08:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:08:41 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:08:41 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:08:41 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:08:41 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=09605be1 ae5a18de
. 2017.01.06 19:08:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:08:42 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:08:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:08:42 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:08:42 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:08:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:08:42 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:08:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:08:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:08:42 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:08:42 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:08:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:08:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:08:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:08:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:08:42 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:08:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:08:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:08:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:08:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:08:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:08:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:08:42 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:08:42 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:08:42 - OpenVPN > open_tun
. 2017.01.06 19:08:42 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:08:42 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:08:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:08:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:08:42 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:08:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:08:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:08:42 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:08:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:08:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:08:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:08:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:08:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:08:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:08:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:08:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:08:42 - Starting Management Interface
. 2017.01.06 19:08:42 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:08:42 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:08:42 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:08:42 - Flushing DNS
I 2017.01.06 19:08:48 - Checking DNS
! 2017.01.06 19:08:49 - Connected.
. 2017.01.06 19:08:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:08:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2017.01.06 19:10:48 - Disconnecting
. 2017.01.06 19:10:48 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:10:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:10:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:10:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:10:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:10:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:10:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:10:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:10:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:10:53 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:10:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:10:53 - Connection terminated.
. 2017.01.06 19:10:53 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:10:53 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:10:53 - IPv6 restored with packet filtering.
. 2017.01.06 19:10:53 - Flushing DNS
! 2017.01.06 19:11:00 - Session terminated.
! 2017.01.06 19:11:04 - Deactivation of Network Lock
I 2017.01.06 19:11:07 - Session starting.
. 2017.01.06 19:11:07 - IPv6 disabled with packet filtering.
I 2017.01.06 19:11:07 - Checking authorization ...
! 2017.01.06 19:11:08 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:11:08 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:11:08 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:11:08 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:11:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:11:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:11:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:11:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:11:08 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:11:08 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:11:08 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:11:08 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=c332fc76 5b394259
. 2017.01.06 19:11:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:11:08 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:11:08 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:11:08 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:11:08 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:11:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:11:08 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:11:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:11:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:11:09 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:11:09 - OpenVPN > Key [AF_INET]185.156.175.58:80 [0] not initialized (yet), dropping packet.
. 2017.01.06 19:11:11 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:11:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:11:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:11:11 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:11:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:11:11 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:11:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:11:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:11:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:11:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:11:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:11:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:11:11 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:11:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:11:11 - OpenVPN > open_tun
. 2017.01.06 19:11:11 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:11:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:11:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:11:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:11:11 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:11:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:11:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:11:16 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:11:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:11:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:11:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:11:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:11:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:11:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:11:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:11:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:11:16 - Starting Management Interface
. 2017.01.06 19:11:16 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:11:16 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:11:16 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:11:17 - Flushing DNS
I 2017.01.06 19:11:23 - Checking DNS
! 2017.01.06 19:11:24 - Connected.
. 2017.01.06 19:11:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:11:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.06 19:12:26 - Updating systems & servers data ...
. 2017.01.06 19:12:28 - Systems & servers data update completed
! 2017.01.06 19:14:46 - Disconnecting
. 2017.01.06 19:14:46 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:14:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:14:46 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:14:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:14:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:14:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:14:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:14:51 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:14:51 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:14:51 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:14:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:14:51 - Connection terminated.
. 2017.01.06 19:14:52 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:14:52 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:14:52 - IPv6 restored with packet filtering.
. 2017.01.06 19:14:52 - Flushing DNS
! 2017.01.06 19:14:58 - Session terminated.
! 2017.01.06 19:14:58 - Activation of Network Lock - Windows Filtering Platform
I 2017.01.06 19:15:03 - Session starting.
. 2017.01.06 19:15:03 - IPv6 disabled with packet filtering.
I 2017.01.06 19:15:03 - Checking authorization ...
! 2017.01.06 19:15:04 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:15:04 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:15:04 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:15:04 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:15:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:15:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:15:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:15:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:15:04 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:15:04 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:15:04 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:15:04 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=4ebfc2d3 104b8b78
. 2017.01.06 19:15:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:15:04 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:15:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:15:04 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:15:04 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:15:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:15:04 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:15:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:15:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:15:05 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:15:06 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:15:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:15:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:15:06 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:15:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:15:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:15:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:15:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:15:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:15:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:15:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:15:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:15:06 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:15:06 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:15:06 - OpenVPN > open_tun
. 2017.01.06 19:15:07 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:15:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:15:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:15:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:15:07 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:15:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:15:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:15:11 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:15:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:15:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:15:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:15:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:15:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:15:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:15:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:15:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:15:11 - Starting Management Interface
. 2017.01.06 19:15:11 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:15:11 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:15:11 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:15:12 - Flushing DNS
I 2017.01.06 19:15:18 - Checking DNS
! 2017.01.06 19:15:19 - Connected.
. 2017.01.06 19:15:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.06 19:15:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2017.01.06 19:17:09 - Disconnecting
. 2017.01.06 19:17:09 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:17:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:17:09 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:17:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:17:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:17:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:17:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:17:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:17:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:17:14 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:17:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:17:14 - Connection terminated.
. 2017.01.06 19:17:14 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:17:14 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:17:14 - IPv6 restored with packet filtering.
. 2017.01.06 19:17:15 - Flushing DNS
! 2017.01.06 19:17:21 - Session terminated.
! 2017.01.06 19:17:23 - Deactivation of Network Lock
! 2017.01.06 19:17:25 - Activation of Network Lock - Windows Firewall
I 2017.01.06 19:17:32 - Session starting.
. 2017.01.06 19:17:32 - IPv6 disabled with packet filtering.
I 2017.01.06 19:17:32 - Checking authorization ...
! 2017.01.06 19:17:33 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:17:33 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:17:33 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:17:33 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:17:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:17:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:17:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:17:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:17:33 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:17:33 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:17:33 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:17:33 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=552e02c2 84d26f81
. 2017.01.06 19:17:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:17:34 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:17:34 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:17:34 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:17:34 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:17:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:17:34 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:17:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:17:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:17:34 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:17:34 - OpenVPN > Key [AF_INET]185.156.175.58:80 [0] not initialized (yet), dropping packet.
. 2017.01.06 19:17:35 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:17:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:17:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:17:36 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:17:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:17:36 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:17:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:17:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:17:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:17:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:17:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:17:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:17:36 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:17:36 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:17:36 - OpenVPN > open_tun
. 2017.01.06 19:17:36 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:17:36 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:17:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:17:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:17:36 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:17:36 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:17:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:17:41 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:17:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:17:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:17:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:17:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:17:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:17:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:17:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:17:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:17:41 - Starting Management Interface
. 2017.01.06 19:17:41 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:17:41 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:17:41 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:17:42 - Flushing DNS
I 2017.01.06 19:17:49 - Checking DNS
! 2017.01.06 19:17:50 - Connected.
. 2017.01.06 19:17:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:17:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2017.01.06 19:19:11 - Disconnecting
. 2017.01.06 19:19:11 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:19:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:19:11 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:19:16 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:19:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:19:16 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:19:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:19:16 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:19:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:19:16 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:19:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:19:16 - Connection terminated.
. 2017.01.06 19:19:16 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:19:16 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:19:16 - IPv6 restored with packet filtering.
. 2017.01.06 19:19:17 - Flushing DNS
! 2017.01.06 19:19:23 - Session terminated.
! 2017.01.06 19:19:23 - Deactivation of Network Lock
I 2017.01.06 19:19:30 - Session starting.
. 2017.01.06 19:19:30 - IPv6 disabled with packet filtering.
I 2017.01.06 19:19:30 - Checking authorization ...
! 2017.01.06 19:19:30 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:19:31 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:19:31 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:19:31 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:19:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:19:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:19:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:19:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:19:31 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:19:31 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:19:31 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:19:31 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=7ea0d3cc f7c03b55
. 2017.01.06 19:19:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:19:31 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:19:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:19:31 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:19:31 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:19:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:19:31 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:19:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:19:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:19:31 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:19:33 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:19:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:19:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:19:33 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:19:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:19:33 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:19:33 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:19:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:19:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:19:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:19:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:19:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:19:33 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:19:33 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:19:33 - OpenVPN > open_tun
. 2017.01.06 19:19:33 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:19:33 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:19:33 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:19:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:19:33 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:19:33 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:19:38 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:19:38 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:19:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:19:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:19:38 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:19:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:19:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:19:38 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:19:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:19:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:19:38 - Starting Management Interface
. 2017.01.06 19:19:38 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:19:38 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:19:38 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:19:39 - Flushing DNS
I 2017.01.06 19:19:45 - Checking DNS
! 2017.01.06 19:19:46 - Connected.
. 2017.01.06 19:19:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:19:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2017.01.06 19:20:39 - Disconnecting
. 2017.01.06 19:20:39 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:20:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:20:39 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:20:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:20:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:20:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:20:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:20:44 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:20:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:20:44 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:20:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:20:44 - Connection terminated.
. 2017.01.06 19:20:45 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:20:45 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:20:45 - IPv6 restored with packet filtering.
. 2017.01.06 19:20:45 - Flushing DNS
! 2017.01.06 19:20:52 - Session terminated.
! 2017.01.06 19:20:52 - Activation of Network Lock - Windows Firewall
I 2017.01.06 19:20:57 - Session starting.
. 2017.01.06 19:20:57 - IPv6 disabled with packet filtering.
I 2017.01.06 19:20:57 - Checking authorization ...
! 2017.01.06 19:20:58 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:20:58 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:20:58 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:20:58 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:20:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:20:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:20:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:20:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:20:58 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:20:58 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:20:58 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:20:58 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=15cddf86 39f7c2b3
. 2017.01.06 19:20:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:20:58 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:20:58 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:20:58 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:20:58 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:20:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:20:58 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:20:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:20:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:20:59 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:21:00 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:21:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:21:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:21:00 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:21:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:21:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:21:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:21:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:21:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:21:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:21:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:21:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:21:00 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:21:00 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:21:00 - OpenVPN > open_tun
. 2017.01.06 19:21:01 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:21:01 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:21:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:21:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:21:01 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:21:01 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:21:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:21:05 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:21:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:21:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:21:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:21:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:21:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:21:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:21:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:21:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:21:05 - Starting Management Interface
. 2017.01.06 19:21:05 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:21:05 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:21:05 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:21:06 - Flushing DNS
I 2017.01.06 19:21:13 - Checking DNS
! 2017.01.06 19:21:13 - Connected.
. 2017.01.06 19:21:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:21:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.06 19:23:13 - Updating systems & servers data ...
. 2017.01.06 19:23:15 - Systems & servers data update completed
! 2017.01.06 19:24:43 - Disconnecting
. 2017.01.06 19:24:43 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:24:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:24:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:24:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:24:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:24:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:24:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:24:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:24:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:24:48 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:24:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:24:48 - Connection terminated.
. 2017.01.06 19:24:48 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:24:48 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:24:48 - IPv6 restored with packet filtering.
. 2017.01.06 19:24:48 - Flushing DNS
! 2017.01.06 19:24:55 - Session terminated.
I 2017.01.06 19:24:55 - Session starting.
. 2017.01.06 19:24:55 - IPv6 disabled with packet filtering.
I 2017.01.06 19:24:55 - Checking authorization ...
! 2017.01.06 19:24:56 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:24:56 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:24:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:24:56 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:24:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:24:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:24:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:24:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:24:56 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:24:56 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:24:56 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:24:56 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=30695779 652d0309
. 2017.01.06 19:24:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:24:59 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:24:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:24:59 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:24:59 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:24:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:24:59 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:24:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:24:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:24:59 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:25:00 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:25:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:25:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:25:00 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:25:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:25:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:25:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:25:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:25:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:25:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:25:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:25:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:25:00 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:25:00 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:25:00 - OpenVPN > open_tun
. 2017.01.06 19:25:01 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:25:01 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:25:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:25:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:25:01 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:25:01 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:25:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:25:05 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:25:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:25:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:25:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:25:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:25:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:25:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:25:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:25:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:25:05 - Starting Management Interface
. 2017.01.06 19:25:05 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:25:05 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:25:05 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:25:06 - Flushing DNS
I 2017.01.06 19:25:13 - Checking DNS
! 2017.01.06 19:25:14 - Connected.
. 2017.01.06 19:25:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:25:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.06 19:34:10 - Updating systems & servers data ...
. 2017.01.06 19:34:11 - Systems & servers data update completed
. 2017.01.06 19:44:42 - Updating systems & servers data ...
. 2017.01.06 19:44:44 - Systems & servers data update completed
! 2017.01.06 19:53:40 - Disconnecting
. 2017.01.06 19:53:40 - Management - Send 'signal SIGTERM'
. 2017.01.06 19:53:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.01.06 19:53:40 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.01.06 19:53:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:53:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:53:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:53:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:53:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:53:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.01.06 19:53:45 - OpenVPN > Closing TUN/TAP interface
. 2017.01.06 19:53:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.01.06 19:53:45 - Connection terminated.
. 2017.01.06 19:53:45 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR938x Wireless Network Adapter, to 75.114.81.1,75.114.81.2)
. 2017.01.06 19:53:45 - DNS leak protection with packet filtering disabled.
. 2017.01.06 19:53:45 - IPv6 restored with packet filtering.
. 2017.01.06 19:53:46 - Flushing DNS
! 2017.01.06 19:53:52 - Session terminated.
I 2017.01.06 19:53:55 - Session starting.
. 2017.01.06 19:53:56 - IPv6 disabled with packet filtering.
I 2017.01.06 19:53:56 - Checking authorization ...
! 2017.01.06 19:53:56 - Connecting to Sirrah (Switzerland, Zurich)
. 2017.01.06 19:53:56 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017
. 2017.01.06 19:53:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2017.01.06 19:53:56 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
. 2017.01.06 19:53:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.01.06 19:53:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:53:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:53:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.58:80
. 2017.01.06 19:53:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2017.01.06 19:53:57 - OpenVPN > UDP link local: (not bound)
. 2017.01.06 19:53:57 - OpenVPN > UDP link remote: [AF_INET]185.156.175.58:80
. 2017.01.06 19:53:57 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.58:80, sid=1a676dc1 0cade5da
. 2017.01.06 19:53:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.01.06 19:53:57 - OpenVPN > Validating certificate key usage
. 2017.01.06 19:53:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.01.06 19:53:57 - OpenVPN > VERIFY KU OK
. 2017.01.06 19:53:57 - OpenVPN > Validating certificate extended key usage
. 2017.01.06 19:53:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.01.06 19:53:57 - OpenVPN > VERIFY EKU OK
. 2017.01.06 19:53:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sirrah, emailAddress=info@airvpn.org
. 2017.01.06 19:53:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.01.06 19:53:57 - OpenVPN > [sirrah] Peer Connection Initiated with [AF_INET]185.156.175.58:80
. 2017.01.06 19:53:58 - OpenVPN > Key [AF_INET]185.156.175.58:80 [0] not initialized (yet), dropping packet.
. 2017.01.06 19:53:58 - OpenVPN > SENT CONTROL [sirrah]: 'PUSH_REQUEST' (status=1)
. 2017.01.06 19:53:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,comp-lzo no,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.5 255.255.0.0'
. 2017.01.06 19:53:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.01.06 19:53:58 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.01.06 19:53:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.01.06 19:53:58 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.01.06 19:53:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.01.06 19:53:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.01.06 19:53:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:53:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:53:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.01.06 19:53:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.01.06 19:53:58 - OpenVPN > interactive service msg_channel=0
. 2017.01.06 19:53:58 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=84:16:f9:b9:03:13
. 2017.01.06 19:53:58 - OpenVPN > open_tun
. 2017.01.06 19:53:59 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{A9572F90-A8CE-4C5E-A1F6-473B52AC037D}.tap
. 2017.01.06 19:53:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.01.06 19:53:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.5/255.255.0.0 [sUCCEEDED]
. 2017.01.06 19:53:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.5/255.255.0.0 on interface {A9572F90-A8CE-4C5E-A1F6-473B52AC037D} [DHCP-serv: 10.6.255.254, lease-time: 31536000]
. 2017.01.06 19:53:59 - OpenVPN > Successful ARP Flush on interface [12] {A9572F90-A8CE-4C5E-A1F6-473B52AC037D}
. 2017.01.06 19:53:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.01.06 19:54:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.01.06 19:54:03 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.58 MASK 255.255.255.255 192.168.0.1
. 2017.01.06 19:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2017.01.06 19:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:54:03 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:54:03 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1
. 2017.01.06 19:54:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2017.01.06 19:54:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.01.06 19:54:03 - Starting Management Interface
. 2017.01.06 19:54:03 - OpenVPN > Initialization Sequence Completed
. 2017.01.06 19:54:03 - DNS leak protection with packet filtering enabled.
. 2017.01.06 19:54:03 - DNS of a network adapter forced (Qualcomm Atheros AR938x Wireless Network Adapter, from manual (75.114.81.1,75.114.81.2) to 10.6.0.1)
. 2017.01.06 19:54:04 - Flushing DNS
I 2017.01.06 19:54:11 - Checking DNS
! 2017.01.06 19:54:12 - Connected.
. 2017.01.06 19:54:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.01.06 19:54:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.01.06 19:54:44 - Updating systems & servers data ...
. 2017.01.06 19:54:46 - Systems & servers data update completed

 

I do not know how the network lock functions and why it would cause a problem here, but i know some people here do. I will also submit a ticket in case no one has a clue either.

 

Side note: Could a setting in Eddie be causing this instead?

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...