Jump to content
Not connected, Your IP: 3.133.157.133
TechnoSnooze

DNS check fails on all servers

Recommended Posts

Was working fine. Then this morning I try servers in Singapore, Canada, California and Texas. All fail on the DNS check for the exit address.

 

Windows 10, AirVpn 10.2.3

Share this post


Link to post

Hello!

 

Can you provide some logs please? It sounds like you just need to disable DNS route checking in the Eddie settings, but logs would be nice .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post
I 2017.01.15 10:33:59 - Eddie client version: 2.11.10 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319

. 2017.01.15 10:34:00 - Reading options from C:\Users\Lee\AppData\Local\AirVPN\AirVPN.xml

. 2017.01.15 10:34:06 - Data path: C:\Users\Lee\AppData\Local\AirVPN

. 2017.01.15 10:34:06 - Application path: C:\Program Files\AirVPN

. 2017.01.15 10:34:06 - Executable path: C:\Program Files\AirVPN\AirVPN.exe

. 2017.01.15 10:34:06 - Command line arguments (1): path="home"

. 2017.01.15 10:34:06 - Operating System: Microsoft Windows NT 10.0.14393.0

W 2017.01.15 10:34:06 - Tunnel driver will be upgraded, from 9.21.1 to 9.21.2.

E 2017.01.15 10:34:09 - OpenVPN Driver - Not available - Will be installed at next connection.

I 2017.01.15 10:34:09 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)

I 2017.01.15 10:34:09 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)

I 2017.01.15 10:34:09 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)

. 2017.01.15 10:34:11 - Updating systems & servers data ...

! 2017.01.15 10:34:11 - Ready

. 2017.01.15 10:34:14 - Systems & servers data update completed

! 2017.01.15 10:34:31 - Activation of Network Lock - Windows Filtering Platform

I 2017.01.15 10:34:54 - Session starting.

W 2017.01.15 10:34:54 - Tunnel driver will be upgraded, from 9.21.1 to 9.21.2.

! 2017.01.15 10:34:54 - Installing tunnel driver

. 2017.01.15 10:35:12 - IPv6 disabled with packet filtering.

I 2017.01.15 10:35:12 - Checking authorization ...

! 2017.01.15 10:35:13 - Connecting to Antares (Singapore, Singapore)

. 2017.01.15 10:35:14 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017

. 2017.01.15 10:35:14 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.15 10:35:14 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.15 10:35:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.15 10:35:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.254.153.68:443

. 2017.01.15 10:35:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.15 10:35:15 - OpenVPN > UDP link local: (not bound)

. 2017.01.15 10:35:15 - OpenVPN > UDP link remote: [AF_INET]103.254.153.68:443

. 2017.01.15 10:35:15 - OpenVPN > TLS: Initial packet from [AF_INET]103.254.153.68:443, sid=f16df577 6a25f8b6

. 2017.01.15 10:35:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.15 10:35:15 - OpenVPN > Validating certificate key usage

. 2017.01.15 10:35:15 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.15 10:35:15 - OpenVPN > VERIFY KU OK

. 2017.01.15 10:35:15 - OpenVPN > Validating certificate extended key usage

. 2017.01.15 10:35:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.15 10:35:15 - OpenVPN > VERIFY EKU OK

. 2017.01.15 10:35:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.15 10:35:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.15 10:35:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]103.254.153.68:443

. 2017.01.15 10:35:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.15 10:35:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.39.241 255.255.0.0'

. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.15 10:35:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.15 10:35:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:35:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:35:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:17 - OpenVPN > interactive service msg_channel=0

. 2017.01.15 10:35:17 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d

. 2017.01.15 10:35:17 - OpenVPN > open_tun

. 2017.01.15 10:35:18 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap

. 2017.01.15 10:35:18 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.15 10:35:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.39.241/255.255.0.0 [sUCCEEDED]

. 2017.01.15 10:35:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.39.241/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.15 10:35:18 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}

. 2017.01.15 10:35:18 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.01.15 10:35:22 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2017.01.15 10:35:22 - OpenVPN > C:\Windows\system32\route.exe ADD 103.254.153.68 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:35:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2017.01.15 10:35:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:35:22 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:35:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:35:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:35:22 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:35:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:35:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:35:22 - Starting Management Interface

. 2017.01.15 10:35:22 - OpenVPN > Initialization Sequence Completed

. 2017.01.15 10:35:12 - DNS leak protection with packet filtering enabled.

. 2017.01.15 10:35:13 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1)

. 2017.01.15 10:35:13 - Flushing DNS

I 2017.01.15 10:35:17 - Checking route

W 2017.01.15 10:35:41 - The remote name could not be resolved: 'antares_exit.airservers.org'

! 2017.01.15 10:35:41 - Disconnecting

. 2017.01.15 10:35:41 - Management - Send 'signal SIGTERM'

. 2017.01.15 10:35:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.15 10:35:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.15 10:35:41 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.15 10:35:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 103.254.153.68 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:35:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:35:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:35:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:35:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:35:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:35:46 - OpenVPN > Closing TUN/TAP interface

. 2017.01.15 10:35:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.15 10:35:46 - Connection terminated.

. 2017.01.15 10:35:47 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1)

. 2017.01.15 10:35:47 - DNS leak protection with packet filtering disabled.

I 2017.01.15 10:35:50 - Checking authorization ...

! 2017.01.15 10:35:51 - Connecting to Homam (Canada, Vancouver)

. 2017.01.15 10:35:51 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017

. 2017.01.15 10:35:51 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.15 10:35:51 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.15 10:35:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.15 10:35:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.26:443

. 2017.01.15 10:35:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.15 10:35:52 - OpenVPN > UDP link local: (not bound)

. 2017.01.15 10:35:52 - OpenVPN > UDP link remote: [AF_INET]71.19.252.26:443

. 2017.01.15 10:35:52 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.26:443, sid=4a7f0274 06e4ff8c

. 2017.01.15 10:35:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.15 10:35:52 - OpenVPN > Validating certificate key usage

. 2017.01.15 10:35:52 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.15 10:35:52 - OpenVPN > VERIFY KU OK

. 2017.01.15 10:35:52 - OpenVPN > Validating certificate extended key usage

. 2017.01.15 10:35:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.15 10:35:52 - OpenVPN > VERIFY EKU OK

. 2017.01.15 10:35:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.15 10:35:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.15 10:35:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.26:443

. 2017.01.15 10:35:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.15 10:35:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.47.169 255.255.0.0'

. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.15 10:35:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.15 10:35:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:35:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:35:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:35:54 - OpenVPN > interactive service msg_channel=0

. 2017.01.15 10:35:54 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d

. 2017.01.15 10:35:55 - OpenVPN > open_tun

. 2017.01.15 10:35:55 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap

. 2017.01.15 10:35:55 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.15 10:35:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.47.169/255.255.0.0 [sUCCEEDED]

. 2017.01.15 10:35:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.47.169/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.15 10:35:55 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}

. 2017.01.15 10:35:55 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.01.15 10:36:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2017.01.15 10:36:00 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.26 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:36:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2017.01.15 10:36:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:36:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:36:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:01 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:36:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:36:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:01 - Starting Management Interface

. 2017.01.15 10:36:01 - OpenVPN > Initialization Sequence Completed

. 2017.01.15 10:36:01 - DNS leak protection with packet filtering enabled.

. 2017.01.15 10:36:01 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1)

. 2017.01.15 10:36:01 - Flushing DNS

I 2017.01.15 10:36:04 - Checking route

W 2017.01.15 10:36:28 - The remote name could not be resolved: 'homam_exit.airservers.org'

! 2017.01.15 10:36:28 - Disconnecting

. 2017.01.15 10:36:28 - Management - Send 'signal SIGTERM'

. 2017.01.15 10:36:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.15 10:36:28 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.15 10:36:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.15 10:36:28 - OpenVpn Management > SUCCESS: signal SIGTERM thrown

. 2017.01.15 10:36:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.26 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:36:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:36:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:36:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:33 - OpenVPN > Closing TUN/TAP interface

. 2017.01.15 10:36:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.15 10:36:33 - Connection terminated.

. 2017.01.15 10:36:33 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1)

. 2017.01.15 10:36:34 - DNS leak protection with packet filtering disabled.

I 2017.01.15 10:36:37 - Checking authorization ...

! 2017.01.15 10:36:38 - Connecting to Heze (United States, Fremont, California)

. 2017.01.15 10:36:38 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017

. 2017.01.15 10:36:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.15 10:36:38 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.15 10:36:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.15 10:36:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:36:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:36:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.151.106:443

. 2017.01.15 10:36:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.15 10:36:38 - OpenVPN > UDP link local: (not bound)

. 2017.01.15 10:36:38 - OpenVPN > UDP link remote: [AF_INET]46.21.151.106:443

. 2017.01.15 10:36:39 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=0e4a2032 aad70061

. 2017.01.15 10:36:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.15 10:36:39 - OpenVPN > Validating certificate key usage

. 2017.01.15 10:36:39 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.15 10:36:39 - OpenVPN > VERIFY KU OK

. 2017.01.15 10:36:39 - OpenVPN > Validating certificate extended key usage

. 2017.01.15 10:36:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.15 10:36:39 - OpenVPN > VERIFY EKU OK

. 2017.01.15 10:36:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.15 10:36:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.15 10:36:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443

. 2017.01.15 10:36:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.15 10:36:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.62 255.255.0.0'

. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.15 10:36:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.15 10:36:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:36:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:36:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:36:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:36:41 - OpenVPN > interactive service msg_channel=0

. 2017.01.15 10:36:41 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d

. 2017.01.15 10:36:41 - OpenVPN > open_tun

. 2017.01.15 10:36:42 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap

. 2017.01.15 10:36:42 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.15 10:36:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.62/255.255.0.0 [sUCCEEDED]

. 2017.01.15 10:36:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.62/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.15 10:36:42 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}

. 2017.01.15 10:36:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.01.15 10:36:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2017.01.15 10:36:47 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.151.106 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:36:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2017.01.15 10:36:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:47 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:36:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:36:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:47 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:36:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:36:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:36:47 - Starting Management Interface

. 2017.01.15 10:36:47 - OpenVPN > Initialization Sequence Completed

. 2017.01.15 10:36:47 - DNS leak protection with packet filtering enabled.

. 2017.01.15 10:36:47 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1)

. 2017.01.15 10:36:47 - Flushing DNS

I 2017.01.15 10:36:51 - Checking route

W 2017.01.15 10:37:27 - The remote name could not be resolved: 'heze_exit.airservers.org'

! 2017.01.15 10:37:27 - Disconnecting

. 2017.01.15 10:37:27 - Management - Send 'signal SIGTERM'

. 2017.01.15 10:37:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.15 10:37:27 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.15 10:37:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.15 10:37:27 - OpenVpn Management > SUCCESS: signal SIGTERM thrown

. 2017.01.15 10:37:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.151.106 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:37:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:37:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:37:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:37:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:37:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:37:32 - OpenVPN > Closing TUN/TAP interface

. 2017.01.15 10:37:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.15 10:37:32 - Connection terminated.

. 2017.01.15 10:37:32 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1)

. 2017.01.15 10:37:33 - DNS leak protection with packet filtering disabled.

I 2017.01.15 10:37:36 - Checking authorization ...

! 2017.01.15 10:37:37 - Connecting to Gemma (Canada, Vancouver)

. 2017.01.15 10:37:37 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017

. 2017.01.15 10:37:37 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.15 10:37:37 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.15 10:37:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.15 10:37:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:37:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:37:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2017.01.15 10:37:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.15 10:37:38 - OpenVPN > UDP link local: (not bound)

. 2017.01.15 10:37:38 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2017.01.15 10:37:38 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=f26c6ed1 c7127013

. 2017.01.15 10:37:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.15 10:37:38 - OpenVPN > Validating certificate key usage

. 2017.01.15 10:37:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.15 10:37:38 - OpenVPN > VERIFY KU OK

. 2017.01.15 10:37:38 - OpenVPN > Validating certificate extended key usage

. 2017.01.15 10:37:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.15 10:37:38 - OpenVPN > VERIFY EKU OK

. 2017.01.15 10:37:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.15 10:37:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.15 10:37:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2017.01.15 10:37:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.15 10:37:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.228 255.255.0.0'

. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.15 10:37:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.15 10:37:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:37:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:37:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:37:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:37:40 - OpenVPN > interactive service msg_channel=0

. 2017.01.15 10:37:40 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d

. 2017.01.15 10:37:40 - OpenVPN > open_tun

. 2017.01.15 10:37:40 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap

. 2017.01.15 10:37:41 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.15 10:37:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.228/255.255.0.0 [sUCCEEDED]

. 2017.01.15 10:37:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.228/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.15 10:37:41 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}

. 2017.01.15 10:37:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.01.15 10:37:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2017.01.15 10:37:45 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:37:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2017.01.15 10:37:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:37:45 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:37:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:37:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:37:45 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:37:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:37:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:37:45 - Starting Management Interface

. 2017.01.15 10:37:45 - OpenVPN > Initialization Sequence Completed

. 2017.01.15 10:37:45 - DNS leak protection with packet filtering enabled.

. 2017.01.15 10:37:45 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1)

. 2017.01.15 10:37:45 - Flushing DNS

I 2017.01.15 10:37:48 - Checking route

W 2017.01.15 10:38:00 - The remote name could not be resolved: 'gemma_exit.airservers.org'

! 2017.01.15 10:38:00 - Disconnecting

. 2017.01.15 10:38:00 - Management - Send 'signal SIGTERM'

. 2017.01.15 10:38:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.15 10:38:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.15 10:38:00 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.15 10:38:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:38:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:38:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:38:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:38:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:38:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:38:05 - OpenVPN > Closing TUN/TAP interface

. 2017.01.15 10:38:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.15 10:38:05 - Connection terminated.

. 2017.01.15 10:38:05 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1)

. 2017.01.15 10:38:06 - DNS leak protection with packet filtering disabled.

I 2017.01.15 10:38:08 - Cancel requested.

. 2017.01.15 10:38:08 - IPv6 restored with packet filtering.

. 2017.01.15 10:38:08 - Flushing DNS

! 2017.01.15 10:38:11 - Session terminated.

I 2017.01.15 10:38:16 - Session starting.

. 2017.01.15 10:38:16 - IPv6 disabled with packet filtering.

I 2017.01.15 10:38:16 - Checking authorization ...

! 2017.01.15 10:38:17 - Connecting to Heze (United States, Fremont, California)

. 2017.01.15 10:38:18 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017

. 2017.01.15 10:38:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.15 10:38:18 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.15 10:38:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.15 10:38:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:38:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:38:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.151.106:443

. 2017.01.15 10:38:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.15 10:38:18 - OpenVPN > UDP link local: (not bound)

. 2017.01.15 10:38:18 - OpenVPN > UDP link remote: [AF_INET]46.21.151.106:443

. 2017.01.15 10:38:18 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=ecfe925c 372acdf3

. 2017.01.15 10:38:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.15 10:38:19 - OpenVPN > Validating certificate key usage

. 2017.01.15 10:38:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.15 10:38:19 - OpenVPN > VERIFY KU OK

. 2017.01.15 10:38:19 - OpenVPN > Validating certificate extended key usage

. 2017.01.15 10:38:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.15 10:38:19 - OpenVPN > VERIFY EKU OK

. 2017.01.15 10:38:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.15 10:38:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.15 10:38:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443

. 2017.01.15 10:38:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.15 10:38:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.62 255.255.0.0'

. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.15 10:38:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.15 10:38:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:38:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:38:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 10:38:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 10:38:21 - OpenVPN > interactive service msg_channel=0

. 2017.01.15 10:38:21 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d

. 2017.01.15 10:38:21 - OpenVPN > open_tun

. 2017.01.15 10:38:21 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap

. 2017.01.15 10:38:21 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.15 10:38:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.62/255.255.0.0 [sUCCEEDED]

. 2017.01.15 10:38:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.62/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.15 10:38:21 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}

. 2017.01.15 10:38:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.01.15 10:38:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2017.01.15 10:38:26 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.151.106 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:38:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2017.01.15 10:38:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:38:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:38:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:38:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:38:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:38:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 10:38:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 10:38:26 - Starting Management Interface

. 2017.01.15 10:38:26 - OpenVPN > Initialization Sequence Completed

. 2017.01.15 10:38:26 - DNS leak protection with packet filtering enabled.

. 2017.01.15 10:38:26 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1)

. 2017.01.15 10:38:26 - Flushing DNS

I 2017.01.15 10:38:29 - Checking route

W 2017.01.15 10:39:05 - The remote name could not be resolved: 'heze_exit.airservers.org'

! 2017.01.15 10:39:06 - Disconnecting

. 2017.01.15 10:39:06 - Management - Send 'signal SIGTERM'

. 2017.01.15 10:39:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.15 10:39:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.15 10:39:06 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.15 10:39:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.151.106 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 10:39:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:39:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:39:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:39:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 10:39:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 10:39:11 - OpenVPN > Closing TUN/TAP interface

. 2017.01.15 10:39:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.15 10:39:11 - Connection terminated.

. 2017.01.15 10:39:11 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1)

. 2017.01.15 10:39:12 - DNS leak protection with packet filtering disabled.

I 2017.01.15 10:39:14 - Cancel requested.

. 2017.01.15 10:39:14 - IPv6 restored with packet filtering.

. 2017.01.15 10:39:14 - Flushing DNS

! 2017.01.15 10:39:17 - Session terminated.

. 2017.01.15 10:44:21 - Updating systems & servers data ...

. 2017.01.15 10:44:23 - Systems & servers data update completed

. 2017.01.15 10:54:49 - Updating systems & servers data ...

. 2017.01.15 10:54:51 - Systems & servers data update completed

. 2017.01.15 11:05:17 - Updating systems & servers data ...

. 2017.01.15 11:05:19 - Systems & servers data update completed

. 2017.01.15 11:15:47 - Updating systems & servers data ...

. 2017.01.15 11:15:49 - Systems & servers data update completed

. 2017.01.15 11:26:16 - Updating systems & servers data ...

. 2017.01.15 11:26:17 - Systems & servers data update completed

. 2017.01.15 11:36:44 - Updating systems & servers data ...

. 2017.01.15 11:36:46 - Systems & servers data update completed

. 2017.01.15 11:47:11 - Updating systems & servers data ...

. 2017.01.15 11:47:13 - Systems & servers data update completed

. 2017.01.15 11:57:39 - Updating systems & servers data ...

. 2017.01.15 11:57:40 - Systems & servers data update completed

. 2017.01.15 12:08:07 - Updating systems & servers data ...

. 2017.01.15 12:08:08 - Systems & servers data update completed

. 2017.01.15 12:18:40 - Updating systems & servers data ...

. 2017.01.15 12:18:42 - Systems & servers data update completed

. 2017.01.15 12:29:12 - Updating systems & servers data ...

. 2017.01.15 12:29:14 - Systems & servers data update completed

. 2017.01.15 12:39:46 - Updating systems & servers data ...

. 2017.01.15 12:39:48 - Systems & servers data update completed

. 2017.01.15 12:50:18 - Updating systems & servers data ...

. 2017.01.15 12:50:20 - Systems & servers data update completed

. 2017.01.15 13:00:48 - Updating systems & servers data ...

. 2017.01.15 13:00:49 - Systems & servers data update completed

I 2017.01.15 13:10:27 - Session starting.

. 2017.01.15 13:10:27 - IPv6 disabled with packet filtering.

I 2017.01.15 13:10:27 - Checking authorization ...

! 2017.01.15 13:10:28 - Connecting to Heze (United States, Fremont, California)

. 2017.01.15 13:10:29 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017

. 2017.01.15 13:10:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.15 13:10:29 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.15 13:10:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.15 13:10:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:10:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:10:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.151.106:443

. 2017.01.15 13:10:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.15 13:10:29 - OpenVPN > UDP link local: (not bound)

. 2017.01.15 13:10:29 - OpenVPN > UDP link remote: [AF_INET]46.21.151.106:443

. 2017.01.15 13:10:29 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=fed09c0e d54bd1e5

. 2017.01.15 13:10:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.15 13:10:29 - OpenVPN > Validating certificate key usage

. 2017.01.15 13:10:29 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.15 13:10:29 - OpenVPN > VERIFY KU OK

. 2017.01.15 13:10:29 - OpenVPN > Validating certificate extended key usage

. 2017.01.15 13:10:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.15 13:10:29 - OpenVPN > VERIFY EKU OK

. 2017.01.15 13:10:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.15 13:10:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.15 13:10:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443

. 2017.01.15 13:10:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.15 13:10:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.62 255.255.0.0'

. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.15 13:10:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.15 13:10:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 13:10:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:10:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 13:10:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:10:32 - OpenVPN > interactive service msg_channel=0

. 2017.01.15 13:10:32 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d

. 2017.01.15 13:10:32 - OpenVPN > open_tun

. 2017.01.15 13:10:32 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap

. 2017.01.15 13:10:32 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.15 13:10:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.62/255.255.0.0 [sUCCEEDED]

. 2017.01.15 13:10:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.62/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.15 13:10:32 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}

. 2017.01.15 13:10:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.01.15 13:10:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2017.01.15 13:10:37 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.151.106 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 13:10:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2017.01.15 13:10:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 13:10:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:10:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 13:10:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 13:10:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:10:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 13:10:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 13:10:38 - Starting Management Interface

. 2017.01.15 13:10:38 - OpenVPN > Initialization Sequence Completed

. 2017.01.15 13:10:38 - DNS leak protection with packet filtering enabled.

. 2017.01.15 13:10:38 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1)

. 2017.01.15 13:10:38 - Flushing DNS

I 2017.01.15 13:10:41 - Checking route

. 2017.01.15 13:11:16 - Updating systems & servers data ...

W 2017.01.15 13:11:17 - The remote name could not be resolved: 'heze_exit.airservers.org'

! 2017.01.15 13:11:17 - Disconnecting

. 2017.01.15 13:11:17 - Management - Send 'signal SIGTERM'

. 2017.01.15 13:11:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.15 13:11:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.15 13:11:17 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.15 13:11:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.151.106 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 13:11:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 13:11:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:11:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 13:11:22 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:11:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 13:11:22 - OpenVPN > Closing TUN/TAP interface

. 2017.01.15 13:11:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.15 13:11:22 - Connection terminated.

. 2017.01.15 13:11:22 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1)

. 2017.01.15 13:11:22 - DNS leak protection with packet filtering disabled.

I 2017.01.15 13:11:24 - Cancel requested.

. 2017.01.15 13:11:24 - IPv6 restored with packet filtering.

. 2017.01.15 13:11:24 - Flushing DNS

! 2017.01.15 13:11:28 - Session terminated.

I 2017.01.15 13:11:28 - Session starting.

. 2017.01.15 13:11:28 - IPv6 disabled with packet filtering.

I 2017.01.15 13:11:28 - Checking authorization ...

! 2017.01.15 13:11:29 - Connecting to Aludra (Canada, Toronto, Ontario)

. 2017.01.15 13:11:30 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan  5 2017

. 2017.01.15 13:11:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2017.01.15 13:11:30 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09

. 2017.01.15 13:11:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.01.15 13:11:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:11:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:11:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.202:443

. 2017.01.15 13:11:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]

. 2017.01.15 13:11:30 - OpenVPN > UDP link local: (not bound)

. 2017.01.15 13:11:30 - OpenVPN > UDP link remote: [AF_INET]104.254.90.202:443

. 2017.01.15 13:11:30 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.202:443, sid=87cfefb0 447b4879

. 2017.01.15 13:11:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.01.15 13:11:30 - OpenVPN > Validating certificate key usage

. 2017.01.15 13:11:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2017.01.15 13:11:30 - OpenVPN > VERIFY KU OK

. 2017.01.15 13:11:30 - OpenVPN > Validating certificate extended key usage

. 2017.01.15 13:11:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.01.15 13:11:30 - OpenVPN > VERIFY EKU OK

. 2017.01.15 13:11:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.01.15 13:11:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.01.15 13:11:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.202:443

. 2017.01.15 13:11:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.01.15 13:11:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.87.131 255.255.0.0'

. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.01.15 13:11:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.01.15 13:11:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 13:11:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:11:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.01.15 13:11:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.01.15 13:11:32 - OpenVPN > interactive service msg_channel=0

. 2017.01.15 13:11:32 - OpenVPN > ROUTE_GATEWAY 10.10.10.1/255.0.0.0 I=6 HWADDR=00:0c:29:59:ca:1d

. 2017.01.15 13:11:32 - OpenVPN > open_tun

. 2017.01.15 13:11:33 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{864928A9-8AE6-4634-B6FE-E47D2E70EA8D}.tap

. 2017.01.15 13:11:33 - OpenVPN > TAP-Windows Driver Version 9.21

. 2017.01.15 13:11:33 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.87.131/255.255.0.0 [sUCCEEDED]

. 2017.01.15 13:11:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.131/255.255.0.0 on interface {864928A9-8AE6-4634-B6FE-E47D2E70EA8D} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2017.01.15 13:11:33 - OpenVPN > Successful ARP Flush on interface [5] {864928A9-8AE6-4634-B6FE-E47D2E70EA8D}

. 2017.01.15 13:11:33 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.01.15 13:11:35 - Systems & servers data update completed

. 2017.01.15 13:11:38 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2017.01.15 13:11:38 - OpenVPN > C:\Windows\system32\route.exe ADD 104.254.90.202 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 13:11:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2017.01.15 13:11:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 13:11:38 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:11:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 13:11:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 13:11:38 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:11:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4

. 2017.01.15 13:11:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2017.01.15 13:11:38 - Starting Management Interface

. 2017.01.15 13:11:38 - OpenVPN > Initialization Sequence Completed

. 2017.01.15 13:11:38 - DNS leak protection with packet filtering enabled.

. 2017.01.15 13:11:38 - DNS of a network adapter forced (Intel® 82574L Gigabit Network Connection, from manual (10.10.10.1) to 10.4.0.1)

. 2017.01.15 13:11:38 - Flushing DNS

I 2017.01.15 13:11:41 - Checking route

W 2017.01.15 13:12:05 - The remote name could not be resolved: 'aludra_exit.airservers.org'

! 2017.01.15 13:12:06 - Disconnecting

. 2017.01.15 13:12:06 - Management - Send 'signal SIGTERM'

. 2017.01.15 13:12:06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2017.01.15 13:12:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2017.01.15 13:12:06 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2017.01.15 13:12:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 104.254.90.202 MASK 255.255.255.255 10.10.10.1

. 2017.01.15 13:12:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 13:12:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:12:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 13:12:11 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2017.01.15 13:12:11 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2017.01.15 13:12:11 - OpenVPN > Closing TUN/TAP interface

. 2017.01.15 13:12:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2017.01.15 13:12:11 - Connection terminated.

. 2017.01.15 13:12:12 - DNS of a network adapter restored to original settings (Intel® 82574L Gigabit Network Connection, to 10.10.10.1)

. 2017.01.15 13:12:12 - DNS leak protection with packet filtering disabled.

I 2017.01.15 13:12:15 - Cancel requested.

. 2017.01.15 13:12:15 - IPv6 restored with packet filtering.

. 2017.01.15 13:12:15 - Flushing DNS

! 2017.01.15 13:12:18 - Session terminated.

Share this post


Link to post

So it works for you now? I didn't know you were in a VM.

You can also try to disable IPv6.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I'm having this issue as well, within a VM running Linux. IPv6 is disabled as well. Eddie will connect and reconnect at least half a dozen times due to the DNS check failing. DNS leaks still occur despite Eddie connecting after successful DNS check. Support ticket opened, just in case.

 

Edit: The logs within Eddie state the following instead before reconnecting over and over, until eventually connecting with DNS leaks.

 

. 2017.01.16 16:01:56 - OpenVPN > Initialization Sequence Completed
I 2017.01.16 16:01:56 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup
I 2017.01.16 16:01:56 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
I 2017.01.16 16:01:56 - Flushing DNS
I 2017.01.16 16:01:56 - Checking route
I 2017.01.16 16:01:56 - Checking DNS
E 2017.01.16 16:01:57 - DNS checking failed.
 

Share this post


Link to post

Update: after being connected for a few minutes, despite the DNS leaks, I re-tested and did not find any DNS leaks. I've noticed this happen a few times in the past but it did not take this long to test positive (for no DNS leaks). I'm hoping this isn't a false-negative test.

Share this post


Link to post

I have this problem also. Tried different settings suggested in the thread. Only when I tried to use manual dns settings (google dns servers) I get connected. With airvpn default dns server (10.4.0.1) connection fails at checking route / dns check. I'm using 2.11.10 on windows 10 (64-bi).

 

Thanks.

 

 

From the log, with default dns server:

. 2017.01.17 15.34.54 - Starting Management Interface
. 2017.01.17 15.34.54 - OpenVPN > Initialization Sequence Completed
. 2017.01.17 15.34.54 - DNS leak protection with packet filtering enabled.
. 2017.01.17 15.34.54 - DNS of a network adapter forced (This Atheros network Controller connects you to the network., from automatic (192.168.100.1,192.168.100.1) to 10.4.0.1)
. 2017.01.17 15.34.54 - Flushing DNS
I 2017.01.17 15.34.57 - Checking route
W 2017.01.17 15.35.09 - The remote name could not be resolved: 'benetnasch_exit.airservers.org'
! 2017.01.17 15.35.09 - Disconnecting
 
 
And with manual dns servers:
. 2017.01.17 15.35.52 - Starting Management Interface
. 2017.01.17 15.35.52 - OpenVPN > Initialization Sequence Completed
. 2017.01.17 15.35.52 - DNS leak protection with packet filtering enabled.
. 2017.01.17 15.35.52 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 8.8.8.8,8.8.4.4)
. 2017.01.17 15.35.53 - DNS of a network adapter forced (This Atheros network Controller connects you to the network., from automatic (192.168.100.1,192.168.100.1) to 8.8.8.8,8.8.4.4)
. 2017.01.17 15.35.53 - Flushing DNS
I 2017.01.17 15.35.57 - Checking route
! 2017.01.17 15.36.01 - Connected.
 

Share this post


Link to post

 

I have this problem also. Tried different settings suggested in the thread. Only when I tried to use manual dns settings (google dns servers) I get connected. With airvpn default dns server (10.4.0.1) connection fails at checking route / dns check. I'm using 2.11.10 on windows 10 (64-bi).

 

Thanks.

 

 

 

This has been fixed. I have not done anything, but vpn worked with default dns server today without problems.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...