TechnoSnooze 0 Posted ... Was working fine. Then this morning I try servers in Singapore, Canada, California and Texas. All fail on the DNS check for the exit address. Windows 10, AirVpn 10.2.3 Quote Share this post Link to post
itsmefloraluca 7 Posted ... Have you tried the Eddie Experimental/Beta Release Here's a link were to find it and shows you with images highlighted in red how to obtain the Beta Version. https://airvpn.org/topic/13002-experimentalbeta-release/ Quote Share this post Link to post
LZ1 672 Posted ... Hello! Can you provide some logs please? It sounds like you just need to disable DNS route checking in the Eddie settings, but logs would be nice . Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
TechnoSnooze 0 Posted ... I 2017.01.15 10:33:59 - Eddie client version: 2.11.10 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319. 2017.01.15 10:34:00 - Reading options from C:\Users\Lee\AppData\Local\AirVPN\AirVPN.xml. 2017.01.15 10:34:06 - Data path: C:\Users\Lee\AppData\Local\AirVPN. 2017.01.15 10:34:06 - Application path: C:\Program Files\AirVPN. 2017.01.15 10:34:06 - Executable path: C:\Program Files\AirVPN\AirVPN.exe. 2017.01.15 10:34:06 - Command line arguments (1): path="home". 2017.01.15 10:34:06 - Operating System: Microsoft Windows NT 10.0.14393.0W 2017.01.15 10:34:06 - Tunnel driver will be upgraded, from 9.21.1 to 9.21.2.E 2017.01.15 10:34:09 - OpenVPN Driver - Not available - Will be installed at next connection.I 2017.01.15 10:34:09 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)I 2017.01.15 10:34:09 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2017.01.15 10:34:09 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe). 2017.01.15 10:34:11 - Updating systems & servers data ...! 2017.01.15 10:34:11 - Ready. 2017.01.15 10:34:14 - Systems & servers data update completed! 2017.01.15 10:34:31 - Activation of Network Lock - Windows Filtering PlatformI 2017.01.15 10:34:54 - Session starting.W 2017.01.15 10:34:54 - Tunnel driver will be upgraded, from 9.21.1 to 9.21.2.! 2017.01.15 10:34:54 - Installing tunnel driver. 2017.01.15 10:35:12 - IPv6 disabled with packet filtering.I 2017.01.15 10:35:12 - Checking authorization ...! 2017.01.15 10:35:13 - Connecting to Antares (Singapore, Singapore). 2017.01.15 10:35:14 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 5 2017. 2017.01.15 10:35:14 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2017.01.15 10:35:14 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.15 10:35:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.15 10:35:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.254.153.68:443. 2017.01.15 10:35:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.01.15 10:35:15 - OpenVPN > UDP link local: (not bound). 2017.01.15 10:35:15 - OpenVPN > UDP link remote: [AF_INET]103.254.153.68:443. 2017.01.15 10:35:15 - OpenVPN > TLS: Initial packet from [AF_INET]103.254.153.68:443, sid=f16df577 6a25f8b6. 2017.01.15 10:35:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.15 10:35:15 - OpenVPN > Validating certificate key usage. 2017.01.15 10:35:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.15 10:35:15 - OpenVPN > VERIFY KU OK. 2017.01.15 10:35:15 - OpenVPN > Validating certificate extended key usage. 2017.01.15 10:35:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.15 10:35:15 - OpenVPN > VERIFY EKU OK. 2017.01.15 10:35:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.15 10:35:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.15 10:35:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]103.254.153.68:443. 2017.01.15 10:35:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.15 10:35:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.39.241 255.255.0.0'. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.15 10:35:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:35:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:35:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:17 - OpenVPN > interactive service msg_channel=0. 2017.01.15 10:35:17 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d. 2017.01.15 10:35:17 - OpenVPN > open_tun. 2017.01.15 10:35:18 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap. 2017.01.15 10:35:18 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.01.15 10:35:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.39.241/255.255.0.0 [sUCCEEDED]. 2017.01.15 10:35:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.39.241/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.01.15 10:35:18 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}. 2017.01.15 10:35:18 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.15 10:35:22 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.01.15 10:35:22 - OpenVPN > C:\Windows\system32\route.exe ADD 103.254.153.68 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:35:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.01.15 10:35:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:35:22 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:35:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:35:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:35:22 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:35:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:35:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:35:22 - Starting Management Interface. 2017.01.15 10:35:22 - OpenVPN > Initialization Sequence Completed. 2017.01.15 10:35:12 - DNS leak protection with packet filtering enabled.. 2017.01.15 10:35:13 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1). 2017.01.15 10:35:13 - Flushing DNSI 2017.01.15 10:35:17 - Checking routeW 2017.01.15 10:35:41 - The remote name could not be resolved: 'antares_exit.airservers.org'! 2017.01.15 10:35:41 - Disconnecting. 2017.01.15 10:35:41 - Management - Send 'signal SIGTERM'. 2017.01.15 10:35:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.15 10:35:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.15 10:35:41 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.15 10:35:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 103.254.153.68 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:35:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:35:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:35:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:35:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:35:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:35:46 - OpenVPN > Closing TUN/TAP interface. 2017.01.15 10:35:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.15 10:35:46 - Connection terminated.. 2017.01.15 10:35:47 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1). 2017.01.15 10:35:47 - DNS leak protection with packet filtering disabled.I 2017.01.15 10:35:50 - Checking authorization ...! 2017.01.15 10:35:51 - Connecting to Homam (Canada, Vancouver). 2017.01.15 10:35:51 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 5 2017. 2017.01.15 10:35:51 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2017.01.15 10:35:51 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.15 10:35:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.15 10:35:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.26:443. 2017.01.15 10:35:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.01.15 10:35:52 - OpenVPN > UDP link local: (not bound). 2017.01.15 10:35:52 - OpenVPN > UDP link remote: [AF_INET]71.19.252.26:443. 2017.01.15 10:35:52 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.26:443, sid=4a7f0274 06e4ff8c. 2017.01.15 10:35:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.15 10:35:52 - OpenVPN > Validating certificate key usage. 2017.01.15 10:35:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.15 10:35:52 - OpenVPN > VERIFY KU OK. 2017.01.15 10:35:52 - OpenVPN > Validating certificate extended key usage. 2017.01.15 10:35:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.15 10:35:52 - OpenVPN > VERIFY EKU OK. 2017.01.15 10:35:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.15 10:35:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.15 10:35:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.26:443. 2017.01.15 10:35:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.15 10:35:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.47.169 255.255.0.0'. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.15 10:35:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:35:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:35:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:35:54 - OpenVPN > interactive service msg_channel=0. 2017.01.15 10:35:54 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d. 2017.01.15 10:35:55 - OpenVPN > open_tun. 2017.01.15 10:35:55 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap. 2017.01.15 10:35:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.01.15 10:35:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.47.169/255.255.0.0 [sUCCEEDED]. 2017.01.15 10:35:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.47.169/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.01.15 10:35:55 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}. 2017.01.15 10:35:55 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.15 10:36:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.01.15 10:36:00 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.26 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:36:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.01.15 10:36:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:36:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:36:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:36:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:36:01 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:36:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:36:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:36:01 - Starting Management Interface. 2017.01.15 10:36:01 - OpenVPN > Initialization Sequence Completed. 2017.01.15 10:36:01 - DNS leak protection with packet filtering enabled.. 2017.01.15 10:36:01 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1). 2017.01.15 10:36:01 - Flushing DNSI 2017.01.15 10:36:04 - Checking routeW 2017.01.15 10:36:28 - The remote name could not be resolved: 'homam_exit.airservers.org'! 2017.01.15 10:36:28 - Disconnecting. 2017.01.15 10:36:28 - Management - Send 'signal SIGTERM'. 2017.01.15 10:36:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.15 10:36:28 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.15 10:36:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.15 10:36:28 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2017.01.15 10:36:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.26 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:36:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:36:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:36:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:36:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:36:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:36:33 - OpenVPN > Closing TUN/TAP interface. 2017.01.15 10:36:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.15 10:36:33 - Connection terminated.. 2017.01.15 10:36:33 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1). 2017.01.15 10:36:34 - DNS leak protection with packet filtering disabled.I 2017.01.15 10:36:37 - Checking authorization ...! 2017.01.15 10:36:38 - Connecting to Heze (United States, Fremont, California). 2017.01.15 10:36:38 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 5 2017. 2017.01.15 10:36:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2017.01.15 10:36:38 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.15 10:36:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.15 10:36:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:36:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:36:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.151.106:443. 2017.01.15 10:36:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.01.15 10:36:38 - OpenVPN > UDP link local: (not bound). 2017.01.15 10:36:38 - OpenVPN > UDP link remote: [AF_INET]46.21.151.106:443. 2017.01.15 10:36:39 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=0e4a2032 aad70061. 2017.01.15 10:36:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.15 10:36:39 - OpenVPN > Validating certificate key usage. 2017.01.15 10:36:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.15 10:36:39 - OpenVPN > VERIFY KU OK. 2017.01.15 10:36:39 - OpenVPN > Validating certificate extended key usage. 2017.01.15 10:36:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.15 10:36:39 - OpenVPN > VERIFY EKU OK. 2017.01.15 10:36:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.15 10:36:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.15 10:36:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443. 2017.01.15 10:36:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.15 10:36:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.62 255.255.0.0'. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.15 10:36:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:36:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:36:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:36:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:36:41 - OpenVPN > interactive service msg_channel=0. 2017.01.15 10:36:41 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d. 2017.01.15 10:36:41 - OpenVPN > open_tun. 2017.01.15 10:36:42 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap. 2017.01.15 10:36:42 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.01.15 10:36:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.62/255.255.0.0 [sUCCEEDED]. 2017.01.15 10:36:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.62/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.01.15 10:36:42 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}. 2017.01.15 10:36:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.15 10:36:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.01.15 10:36:47 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.151.106 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:36:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.01.15 10:36:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:36:47 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:36:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:36:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:36:47 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:36:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:36:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:36:47 - Starting Management Interface. 2017.01.15 10:36:47 - OpenVPN > Initialization Sequence Completed. 2017.01.15 10:36:47 - DNS leak protection with packet filtering enabled.. 2017.01.15 10:36:47 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1). 2017.01.15 10:36:47 - Flushing DNSI 2017.01.15 10:36:51 - Checking routeW 2017.01.15 10:37:27 - The remote name could not be resolved: 'heze_exit.airservers.org'! 2017.01.15 10:37:27 - Disconnecting. 2017.01.15 10:37:27 - Management - Send 'signal SIGTERM'. 2017.01.15 10:37:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.15 10:37:27 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.15 10:37:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.15 10:37:27 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2017.01.15 10:37:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.151.106 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:37:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:37:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:37:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:37:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:37:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:37:32 - OpenVPN > Closing TUN/TAP interface. 2017.01.15 10:37:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.15 10:37:32 - Connection terminated.. 2017.01.15 10:37:32 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1). 2017.01.15 10:37:33 - DNS leak protection with packet filtering disabled.I 2017.01.15 10:37:36 - Checking authorization ...! 2017.01.15 10:37:37 - Connecting to Gemma (Canada, Vancouver). 2017.01.15 10:37:37 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 5 2017. 2017.01.15 10:37:37 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2017.01.15 10:37:37 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.15 10:37:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.15 10:37:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:37:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:37:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443. 2017.01.15 10:37:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.01.15 10:37:38 - OpenVPN > UDP link local: (not bound). 2017.01.15 10:37:38 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443. 2017.01.15 10:37:38 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=f26c6ed1 c7127013. 2017.01.15 10:37:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.15 10:37:38 - OpenVPN > Validating certificate key usage. 2017.01.15 10:37:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.15 10:37:38 - OpenVPN > VERIFY KU OK. 2017.01.15 10:37:38 - OpenVPN > Validating certificate extended key usage. 2017.01.15 10:37:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.15 10:37:38 - OpenVPN > VERIFY EKU OK. 2017.01.15 10:37:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.15 10:37:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.15 10:37:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2017.01.15 10:37:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.15 10:37:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.228 255.255.0.0'. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.15 10:37:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:37:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:37:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:37:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:37:40 - OpenVPN > interactive service msg_channel=0. 2017.01.15 10:37:40 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d. 2017.01.15 10:37:40 - OpenVPN > open_tun. 2017.01.15 10:37:40 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap. 2017.01.15 10:37:41 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.01.15 10:37:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.228/255.255.0.0 [sUCCEEDED]. 2017.01.15 10:37:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.228/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.01.15 10:37:41 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}. 2017.01.15 10:37:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.15 10:37:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.01.15 10:37:45 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:37:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.01.15 10:37:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:37:45 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:37:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:37:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:37:45 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:37:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:37:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:37:45 - Starting Management Interface. 2017.01.15 10:37:45 - OpenVPN > Initialization Sequence Completed. 2017.01.15 10:37:45 - DNS leak protection with packet filtering enabled.. 2017.01.15 10:37:45 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1). 2017.01.15 10:37:45 - Flushing DNSI 2017.01.15 10:37:48 - Checking routeW 2017.01.15 10:38:00 - The remote name could not be resolved: 'gemma_exit.airservers.org'! 2017.01.15 10:38:00 - Disconnecting. 2017.01.15 10:38:00 - Management - Send 'signal SIGTERM'. 2017.01.15 10:38:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.15 10:38:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.15 10:38:00 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.15 10:38:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:38:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:38:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:38:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:38:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:38:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:38:05 - OpenVPN > Closing TUN/TAP interface. 2017.01.15 10:38:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.15 10:38:05 - Connection terminated.. 2017.01.15 10:38:05 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1). 2017.01.15 10:38:06 - DNS leak protection with packet filtering disabled.I 2017.01.15 10:38:08 - Cancel requested.. 2017.01.15 10:38:08 - IPv6 restored with packet filtering.. 2017.01.15 10:38:08 - Flushing DNS! 2017.01.15 10:38:11 - Session terminated.I 2017.01.15 10:38:16 - Session starting.. 2017.01.15 10:38:16 - IPv6 disabled with packet filtering.I 2017.01.15 10:38:16 - Checking authorization ...! 2017.01.15 10:38:17 - Connecting to Heze (United States, Fremont, California). 2017.01.15 10:38:18 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 5 2017. 2017.01.15 10:38:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2017.01.15 10:38:18 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.15 10:38:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.15 10:38:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:38:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:38:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.151.106:443. 2017.01.15 10:38:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.01.15 10:38:18 - OpenVPN > UDP link local: (not bound). 2017.01.15 10:38:18 - OpenVPN > UDP link remote: [AF_INET]46.21.151.106:443. 2017.01.15 10:38:18 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=ecfe925c 372acdf3. 2017.01.15 10:38:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.15 10:38:19 - OpenVPN > Validating certificate key usage. 2017.01.15 10:38:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.15 10:38:19 - OpenVPN > VERIFY KU OK. 2017.01.15 10:38:19 - OpenVPN > Validating certificate extended key usage. 2017.01.15 10:38:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.15 10:38:19 - OpenVPN > VERIFY EKU OK. 2017.01.15 10:38:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.15 10:38:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.15 10:38:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443. 2017.01.15 10:38:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.15 10:38:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.62 255.255.0.0'. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.15 10:38:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:38:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:38:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 10:38:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 10:38:21 - OpenVPN > interactive service msg_channel=0. 2017.01.15 10:38:21 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d. 2017.01.15 10:38:21 - OpenVPN > open_tun. 2017.01.15 10:38:21 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap. 2017.01.15 10:38:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.01.15 10:38:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.62/255.255.0.0 [sUCCEEDED]. 2017.01.15 10:38:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.62/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.01.15 10:38:21 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}. 2017.01.15 10:38:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.15 10:38:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.01.15 10:38:26 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.151.106 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:38:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.01.15 10:38:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:38:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:38:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:38:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:38:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:38:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 10:38:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 10:38:26 - Starting Management Interface. 2017.01.15 10:38:26 - OpenVPN > Initialization Sequence Completed. 2017.01.15 10:38:26 - DNS leak protection with packet filtering enabled.. 2017.01.15 10:38:26 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1). 2017.01.15 10:38:26 - Flushing DNSI 2017.01.15 10:38:29 - Checking routeW 2017.01.15 10:39:05 - The remote name could not be resolved: 'heze_exit.airservers.org'! 2017.01.15 10:39:06 - Disconnecting. 2017.01.15 10:39:06 - Management - Send 'signal SIGTERM'. 2017.01.15 10:39:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.15 10:39:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.15 10:39:06 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.15 10:39:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.151.106 MASK 255.255.255.255 10.10.10.1. 2017.01.15 10:39:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:39:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:39:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:39:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 10:39:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 10:39:11 - OpenVPN > Closing TUN/TAP interface. 2017.01.15 10:39:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.15 10:39:11 - Connection terminated.. 2017.01.15 10:39:11 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1). 2017.01.15 10:39:12 - DNS leak protection with packet filtering disabled.I 2017.01.15 10:39:14 - Cancel requested.. 2017.01.15 10:39:14 - IPv6 restored with packet filtering.. 2017.01.15 10:39:14 - Flushing DNS! 2017.01.15 10:39:17 - Session terminated.. 2017.01.15 10:44:21 - Updating systems & servers data .... 2017.01.15 10:44:23 - Systems & servers data update completed. 2017.01.15 10:54:49 - Updating systems & servers data .... 2017.01.15 10:54:51 - Systems & servers data update completed. 2017.01.15 11:05:17 - Updating systems & servers data .... 2017.01.15 11:05:19 - Systems & servers data update completed. 2017.01.15 11:15:47 - Updating systems & servers data .... 2017.01.15 11:15:49 - Systems & servers data update completed. 2017.01.15 11:26:16 - Updating systems & servers data .... 2017.01.15 11:26:17 - Systems & servers data update completed. 2017.01.15 11:36:44 - Updating systems & servers data .... 2017.01.15 11:36:46 - Systems & servers data update completed. 2017.01.15 11:47:11 - Updating systems & servers data .... 2017.01.15 11:47:13 - Systems & servers data update completed. 2017.01.15 11:57:39 - Updating systems & servers data .... 2017.01.15 11:57:40 - Systems & servers data update completed. 2017.01.15 12:08:07 - Updating systems & servers data .... 2017.01.15 12:08:08 - Systems & servers data update completed. 2017.01.15 12:18:40 - Updating systems & servers data .... 2017.01.15 12:18:42 - Systems & servers data update completed. 2017.01.15 12:29:12 - Updating systems & servers data .... 2017.01.15 12:29:14 - Systems & servers data update completed. 2017.01.15 12:39:46 - Updating systems & servers data .... 2017.01.15 12:39:48 - Systems & servers data update completed. 2017.01.15 12:50:18 - Updating systems & servers data .... 2017.01.15 12:50:20 - Systems & servers data update completed. 2017.01.15 13:00:48 - Updating systems & servers data .... 2017.01.15 13:00:49 - Systems & servers data update completedI 2017.01.15 13:10:27 - Session starting.. 2017.01.15 13:10:27 - IPv6 disabled with packet filtering.I 2017.01.15 13:10:27 - Checking authorization ...! 2017.01.15 13:10:28 - Connecting to Heze (United States, Fremont, California). 2017.01.15 13:10:29 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 5 2017. 2017.01.15 13:10:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2017.01.15 13:10:29 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.15 13:10:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.15 13:10:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:10:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:10:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.151.106:443. 2017.01.15 13:10:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.01.15 13:10:29 - OpenVPN > UDP link local: (not bound). 2017.01.15 13:10:29 - OpenVPN > UDP link remote: [AF_INET]46.21.151.106:443. 2017.01.15 13:10:29 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=fed09c0e d54bd1e5. 2017.01.15 13:10:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.15 13:10:29 - OpenVPN > Validating certificate key usage. 2017.01.15 13:10:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.15 13:10:29 - OpenVPN > VERIFY KU OK. 2017.01.15 13:10:29 - OpenVPN > Validating certificate extended key usage. 2017.01.15 13:10:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.15 13:10:29 - OpenVPN > VERIFY EKU OK. 2017.01.15 13:10:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.15 13:10:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.15 13:10:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443. 2017.01.15 13:10:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.15 13:10:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.62 255.255.0.0'. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.15 13:10:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 13:10:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:10:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 13:10:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:10:32 - OpenVPN > interactive service msg_channel=0. 2017.01.15 13:10:32 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d. 2017.01.15 13:10:32 - OpenVPN > open_tun. 2017.01.15 13:10:32 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap. 2017.01.15 13:10:32 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.01.15 13:10:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.62/255.255.0.0 [sUCCEEDED]. 2017.01.15 13:10:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.62/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.01.15 13:10:32 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}. 2017.01.15 13:10:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.15 13:10:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.01.15 13:10:37 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.151.106 MASK 255.255.255.255 10.10.10.1. 2017.01.15 13:10:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.01.15 13:10:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 13:10:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:10:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 13:10:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 13:10:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:10:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 13:10:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 13:10:38 - Starting Management Interface. 2017.01.15 13:10:38 - OpenVPN > Initialization Sequence Completed. 2017.01.15 13:10:38 - DNS leak protection with packet filtering enabled.. 2017.01.15 13:10:38 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1). 2017.01.15 13:10:38 - Flushing DNSI 2017.01.15 13:10:41 - Checking route. 2017.01.15 13:11:16 - Updating systems & servers data ...W 2017.01.15 13:11:17 - The remote name could not be resolved: 'heze_exit.airservers.org'! 2017.01.15 13:11:17 - Disconnecting. 2017.01.15 13:11:17 - Management - Send 'signal SIGTERM'. 2017.01.15 13:11:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.15 13:11:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.15 13:11:17 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.15 13:11:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.151.106 MASK 255.255.255.255 10.10.10.1. 2017.01.15 13:11:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 13:11:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:11:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 13:11:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:11:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 13:11:22 - OpenVPN > Closing TUN/TAP interface. 2017.01.15 13:11:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.15 13:11:22 - Connection terminated.. 2017.01.15 13:11:22 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1). 2017.01.15 13:11:22 - DNS leak protection with packet filtering disabled.I 2017.01.15 13:11:24 - Cancel requested.. 2017.01.15 13:11:24 - IPv6 restored with packet filtering.. 2017.01.15 13:11:24 - Flushing DNS! 2017.01.15 13:11:28 - Session terminated.I 2017.01.15 13:11:28 - Session starting.. 2017.01.15 13:11:28 - IPv6 disabled with packet filtering.I 2017.01.15 13:11:28 - Checking authorization ...! 2017.01.15 13:11:29 - Connecting to Aludra (Canada, Toronto, Ontario). 2017.01.15 13:11:30 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 5 2017. 2017.01.15 13:11:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2017.01.15 13:11:30 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.15 13:11:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.15 13:11:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:11:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:11:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.202:443. 2017.01.15 13:11:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.01.15 13:11:30 - OpenVPN > UDP link local: (not bound). 2017.01.15 13:11:30 - OpenVPN > UDP link remote: [AF_INET]104.254.90.202:443. 2017.01.15 13:11:30 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.202:443, sid=87cfefb0 447b4879. 2017.01.15 13:11:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.15 13:11:30 - OpenVPN > Validating certificate key usage. 2017.01.15 13:11:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.15 13:11:30 - OpenVPN > VERIFY KU OK. 2017.01.15 13:11:30 - OpenVPN > Validating certificate extended key usage. 2017.01.15 13:11:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.15 13:11:30 - OpenVPN > VERIFY EKU OK. 2017.01.15 13:11:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.15 13:11:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.15 13:11:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.202:443. 2017.01.15 13:11:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.15 13:11:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.87.131 255.255.0.0'. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.15 13:11:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 13:11:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:11:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.15 13:11:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.15 13:11:32 - OpenVPN > interactive service msg_channel=0. 2017.01.15 13:11:32 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d. 2017.01.15 13:11:32 - OpenVPN > open_tun. 2017.01.15 13:11:33 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap. 2017.01.15 13:11:33 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.01.15 13:11:33 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.87.131/255.255.0.0 [sUCCEEDED]. 2017.01.15 13:11:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.131/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.01.15 13:11:33 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}. 2017.01.15 13:11:33 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.15 13:11:35 - Systems & servers data update completed. 2017.01.15 13:11:38 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.01.15 13:11:38 - OpenVPN > C:\Windows\system32\route.exe ADD 104.254.90.202 MASK 255.255.255.255 10.10.10.1. 2017.01.15 13:11:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.01.15 13:11:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 13:11:38 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:11:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 13:11:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 13:11:38 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:11:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.01.15 13:11:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.01.15 13:11:38 - Starting Management Interface. 2017.01.15 13:11:38 - OpenVPN > Initialization Sequence Completed. 2017.01.15 13:11:38 - DNS leak protection with packet filtering enabled.. 2017.01.15 13:11:38 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1). 2017.01.15 13:11:38 - Flushing DNSI 2017.01.15 13:11:41 - Checking routeW 2017.01.15 13:12:05 - The remote name could not be resolved: 'aludra_exit.airservers.org'! 2017.01.15 13:12:06 - Disconnecting. 2017.01.15 13:12:06 - Management - Send 'signal SIGTERM'. 2017.01.15 13:12:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.15 13:12:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.15 13:12:06 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.15 13:12:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 104.254.90.202 MASK 255.255.255.255 10.10.10.1. 2017.01.15 13:12:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 13:12:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:12:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 13:12:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.01.15 13:12:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.01.15 13:12:11 - OpenVPN > Closing TUN/TAP interface. 2017.01.15 13:12:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.15 13:12:11 - Connection terminated.. 2017.01.15 13:12:12 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1). 2017.01.15 13:12:12 - DNS leak protection with packet filtering disabled.I 2017.01.15 13:12:15 - Cancel requested.. 2017.01.15 13:12:15 - IPv6 restored with packet filtering.. 2017.01.15 13:12:15 - Flushing DNS! 2017.01.15 13:12:18 - Session terminated. Quote Share this post Link to post
TechnoSnooze 0 Posted ... Tried disabling Check AirVPN DNS in Options/DNS with same result. Quote Share this post Link to post
TechnoSnooze 0 Posted ... Tried disabling 'Check if the tunnel works' under Advanced. Connects but I get no DNS resolution on any site. Quote Share this post Link to post
TechnoSnooze 0 Posted ... I restarted my VM and suddenly I can connect again, even to Singapore, which never worked before. Quote Share this post Link to post
LZ1 672 Posted ... So it works for you now? I didn't know you were in a VM.You can also try to disable IPv6. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
unit13 0 Posted ... I'm having this issue as well, within a VM running Linux. IPv6 is disabled as well. Eddie will connect and reconnect at least half a dozen times due to the DNS check failing. DNS leaks still occur despite Eddie connecting after successful DNS check. Support ticket opened, just in case. Edit: The logs within Eddie state the following instead before reconnecting over and over, until eventually connecting with DNS leaks. . 2017.01.16 16:01:56 - OpenVPN > Initialization Sequence CompletedI 2017.01.16 16:01:56 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backupI 2017.01.16 16:01:56 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2017.01.16 16:01:56 - Flushing DNSI 2017.01.16 16:01:56 - Checking routeI 2017.01.16 16:01:56 - Checking DNSE 2017.01.16 16:01:57 - DNS checking failed. Quote Share this post Link to post
unit13 0 Posted ... Update: after being connected for a few minutes, despite the DNS leaks, I re-tested and did not find any DNS leaks. I've noticed this happen a few times in the past but it did not take this long to test positive (for no DNS leaks). I'm hoping this isn't a false-negative test. Quote Share this post Link to post
hvihavai 1 Posted ... I have this problem also. Tried different settings suggested in the thread. Only when I tried to use manual dns settings (google dns servers) I get connected. With airvpn default dns server (10.4.0.1) connection fails at checking route / dns check. I'm using 2.11.10 on windows 10 (64-bi). Thanks. From the log, with default dns server:. 2017.01.17 15.34.54 - Starting Management Interface. 2017.01.17 15.34.54 - OpenVPN > Initialization Sequence Completed. 2017.01.17 15.34.54 - DNS leak protection with packet filtering enabled.. 2017.01.17 15.34.54 - DNS of a network adapter forced (This Atheros network Controller connects you to the network., from automatic (192.168.100.1,192.168.100.1) to 10.4.0.1). 2017.01.17 15.34.54 - Flushing DNSI 2017.01.17 15.34.57 - Checking routeW 2017.01.17 15.35.09 - The remote name could not be resolved: 'benetnasch_exit.airservers.org'! 2017.01.17 15.35.09 - Disconnecting And with manual dns servers:. 2017.01.17 15.35.52 - Starting Management Interface. 2017.01.17 15.35.52 - OpenVPN > Initialization Sequence Completed. 2017.01.17 15.35.52 - DNS leak protection with packet filtering enabled.. 2017.01.17 15.35.52 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 8.8.8.8,8.8.4.4). 2017.01.17 15.35.53 - DNS of a network adapter forced (This Atheros network Controller connects you to the network., from automatic (192.168.100.1,192.168.100.1) to 8.8.8.8,8.8.4.4). 2017.01.17 15.35.53 - Flushing DNSI 2017.01.17 15.35.57 - Checking route! 2017.01.17 15.36.01 - Connected. Quote Share this post Link to post
hvihavai 1 Posted ... I have this problem also. Tried different settings suggested in the thread. Only when I tried to use manual dns settings (google dns servers) I get connected. With airvpn default dns server (10.4.0.1) connection fails at checking route / dns check. I'm using 2.11.10 on windows 10 (64-bi). Thanks. This has been fixed. I have not done anything, but vpn worked with default dns server today without problems. Quote Share this post Link to post