Guest Posted ... Thank you~ ^^ No problems for me W8.1 x64 1 Nasdaq reacted to this Share this post Link to post
Clodo 176 Posted ... the new site gave me blank sections for OS, Architecture, Format and UI until I disabled uBlock (now needs exceptions set).Unbelievable. The uBlock listRUS: RU AdList (Дополнительная региональная подписка)https://easylist-downloads.adblockplus.org/advblock.txt blocks any website with TLD ".website" under https, for a bad rule ||s*.website^$third-party,script I am trying to register to support forum https://forums.lanik.us/index.php but his web site throws PHP errors. The only email I found is no-reply@lanik.us , not it is not read by anyone. I would be grateful if someone who is able to contact him can warn him about the problem, otherwise remove this bad-written list. 3 LZ1, encrypted and Penlane reacted to this Share this post Link to post
snapz 37 Posted ... Works good on mac and linux debian.Fantastic job you all did, THANKS!!!!!! Hide snapz's signature Hide all signatures I have nothing to hide, but that's nobody's business!Our society is run by insane people for insane objectives. I think we're being run by maniacs for maniacal ends and I think I'm liable to be put away as insane for expressing that. That's what's insane about it.John LennonThe further a society drift from truth the more it will hate those that speak it.George Orwell Share this post Link to post
Keksjdjdke 35 Posted ... I keep getting this error when I run Eddie from terminal. . 2017.02.03 01:14:21 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (An exception occurred during a WebClient request.)F 2017.02.03 01:14:21 - Cannot login. (An exception occurred during a WebClient request.)! 2017.02.03 01:14:21 - ReadyI'm running macOS 10.12.3 (16D32) Share this post Link to post
Clodo 176 Posted ... Is AirVPN now supporting OpenVPN 2.4 server side as well? Or just a 2.4 client connecting to a 2.3 server?Some server are already 2.4, others 2.3.*. Upgrading need disconnection of all users on that server, so it's not done frequently without a good reason. 1 princi reacted to this Share this post Link to post
yaranaika 3 Posted ... Thank You for tweaking the startup and connection times!Always had the problem that it took a while with "Network Lock" on to open up and connect to a server.Software like Steam were always faster than AirVPN and I had to re-login into my Steam account every time when I booted my PC.So THANK YOU very much for making Eddie great again! (I had the client on my SSD the whole time and have an 400 Mbit/s internet connection [even though I only get 210 Mbit/s w. AirVPN out of my 410 Mbit/s what I get without VPN ((]) Share this post Link to post
misam 9 Posted ... Eddie 2.11.15 stable still fails DNS checks on Manjaro. This happens with both rename and resolvconf methods of changing the DNS. I will attempt to connect and it will fail the DNS check, disconnect, attempt to reconnect, fail the DNS check, disconnect, attempt to reconnect, etc . . . If I uncheck the "Check AirVPN DNS" box in the settings, and attempt to connect without performing a DNS check, it will connect. If I check ipleak.net the DNS server is (correctly) the same address as my IP address. If I check my resolv.conf file, the address is (correctly) "nameserver 10.4.0.1". The fact that everything looks correct makes me wonder why it always fails the DNS check, and why this problem has existed for so long. As an extra note, Eddie 2.10.3 still succeeds at the DNS check when I run it on my system. Here are my logs from when I was attempting to connect and failing the DNS check with Eddie 2.11.15:! 2017.01.31 15:32:56 - Activation of Network Lock - Linux IPTablesI 2017.01.31 15:33:02 - Session starting.. 2017.01.31 15:33:02 - Unable to understand if IPv6 is active.I 2017.01.31 15:33:02 - Checking authorization ...! 2017.01.31 15:33:02 - Connecting to Benetnasch (Sweden, Uppsala). 2017.01.31 15:33:02 - OpenVPN > OpenVPN 2.4.0 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 28 2016. 2017.01.31 15:33:02 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.31 15:33:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.31 15:33:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.148:443. 2017.01.31 15:33:02 - OpenVPN > Socket Buffers: R=[212992->425984] S=[212992->425984]. 2017.01.31 15:33:02 - OpenVPN > UDP link local: (not bound). 2017.01.31 15:33:02 - OpenVPN > UDP link remote: [AF_INET]62.102.148.148:443. 2017.01.31 15:33:02 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.148:443, sid=adf04b29 e498cdce. 2017.01.31 15:33:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.31 15:33:02 - OpenVPN > Validating certificate key usage. 2017.01.31 15:33:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.31 15:33:02 - OpenVPN > VERIFY KU OK. 2017.01.31 15:33:02 - OpenVPN > Validating certificate extended key usage. 2017.01.31 15:33:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.31 15:33:03 - OpenVPN > VERIFY EKU OK. 2017.01.31 15:33:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.31 15:33:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.31 15:33:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.148:443. 2017.01.31 15:33:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.31 15:33:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.177 255.255.0.0'. 2017.01.31 15:33:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.31 15:33:04 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.31 15:33:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.31 15:33:04 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.31 15:33:04 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.31 15:33:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.31 15:33:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:33:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:33:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:04 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eno1 HWADDR=ac:22:0b:4b:9e:1d. 2017.01.31 15:33:04 - OpenVPN > TUN/TAP device tun0 opened. 2017.01.31 15:33:04 - OpenVPN > TUN/TAP TX queue length set to 100. 2017.01.31 15:33:04 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.31 15:33:04 - OpenVPN > /usr/bin/ip link set dev tun0 up mtu 1500. 2017.01.31 15:33:04 - OpenVPN > /usr/bin/ip addr add dev tun0 10.4.11.177/16 broadcast 10.4.255.255. 2017.01.31 15:33:10 - OpenVPN > /usr/bin/ip route add 62.102.148.148/32 via 192.168.1.1. 2017.01.31 15:33:10 - OpenVPN > /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1. 2017.01.31 15:33:10 - OpenVPN > /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1. 2017.01.31 15:33:10 - Starting Management Interface. 2017.01.31 15:33:10 - OpenVPN > Initialization Sequence Completed. 2017.01.31 15:33:10 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup. 2017.01.31 15:33:10 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2017.01.31 15:33:10 - Checking routeI 2017.01.31 15:33:12 - Checking DNSE 2017.01.31 15:33:12 - Checking DNS don't match. 2017.01.31 15:33:12 - Checking DNS (2° try)E 2017.01.31 15:33:14 - Checking DNS don't match. 2017.01.31 15:33:14 - Checking DNS (3° try)E 2017.01.31 15:33:16 - Checking DNS don't matchE 2017.01.31 15:33:16 - DNS checking failed.. 2017.01.31 15:33:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2017.01.31 15:33:16 - Disconnecting. 2017.01.31 15:33:16 - Management - Send 'signal SIGTERM'. 2017.01.31 15:33:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.31 15:33:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.31 15:33:16 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.31 15:33:17 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2017.01.31 15:33:22 - OpenVPN > /usr/bin/ip route del 62.102.148.148/32. 2017.01.31 15:33:22 - OpenVPN > /usr/bin/ip route del 0.0.0.0/1. 2017.01.31 15:33:22 - OpenVPN > /usr/bin/ip route del 128.0.0.0/1. 2017.01.31 15:33:22 - OpenVPN > Closing TUN/TAP interface. 2017.01.31 15:33:22 - OpenVPN > /usr/bin/ip addr del dev tun0 10.4.11.177/16. 2017.01.31 15:33:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.31 15:33:22 - Connection terminated.. 2017.01.31 15:33:22 - DNS of the system restored to original settings (Rename method)I 2017.01.31 15:33:25 - Checking authorization ...! 2017.01.31 15:33:25 - Connecting to Alula (Sweden, Uppsala). 2017.01.31 15:33:25 - OpenVPN > OpenVPN 2.4.0 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 28 2016. 2017.01.31 15:33:25 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.31 15:33:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.31 15:33:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.151:443. 2017.01.31 15:33:25 - OpenVPN > Socket Buffers: R=[212992->425984] S=[212992->425984]. 2017.01.31 15:33:25 - OpenVPN > UDP link local: (not bound). 2017.01.31 15:33:25 - OpenVPN > UDP link remote: [AF_INET]62.102.148.151:443. 2017.01.31 15:33:28 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.151:443, sid=796ad521 277705f7. 2017.01.31 15:33:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.31 15:33:28 - OpenVPN > Validating certificate key usage. 2017.01.31 15:33:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.31 15:33:28 - OpenVPN > VERIFY KU OK. 2017.01.31 15:33:28 - OpenVPN > Validating certificate extended key usage. 2017.01.31 15:33:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.31 15:33:28 - OpenVPN > VERIFY EKU OK. 2017.01.31 15:33:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.31 15:33:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.31 15:33:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.151:443. 2017.01.31 15:33:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.31 15:33:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.69 255.255.0.0'. 2017.01.31 15:33:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.31 15:33:30 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.31 15:33:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.31 15:33:30 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.31 15:33:30 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.31 15:33:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.31 15:33:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:33:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:33:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:33:30 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eno1 HWADDR=ac:22:0b:4b:9e:1d. 2017.01.31 15:33:30 - OpenVPN > TUN/TAP device tun0 opened. 2017.01.31 15:33:30 - OpenVPN > TUN/TAP TX queue length set to 100. 2017.01.31 15:33:30 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.31 15:33:30 - OpenVPN > /usr/bin/ip link set dev tun0 up mtu 1500. 2017.01.31 15:33:30 - OpenVPN > /usr/bin/ip addr add dev tun0 10.4.20.69/16 broadcast 10.4.255.255. 2017.01.31 15:33:35 - OpenVPN > /usr/bin/ip route add 62.102.148.151/32 via 192.168.1.1. 2017.01.31 15:33:35 - OpenVPN > /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1. 2017.01.31 15:33:35 - OpenVPN > /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1. 2017.01.31 15:33:35 - Starting Management Interface. 2017.01.31 15:33:35 - OpenVPN > Initialization Sequence Completed. 2017.01.31 15:33:35 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup. 2017.01.31 15:33:35 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2017.01.31 15:33:35 - Checking routeI 2017.01.31 15:33:36 - Checking DNSE 2017.01.31 15:33:37 - Checking DNS don't match. 2017.01.31 15:33:37 - Checking DNS (2° try)E 2017.01.31 15:33:38 - Checking DNS don't match. 2017.01.31 15:33:38 - Checking DNS (3° try)E 2017.01.31 15:33:41 - Checking DNS don't matchE 2017.01.31 15:33:41 - DNS checking failed.. 2017.01.31 15:33:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2017.01.31 15:33:41 - Disconnecting. 2017.01.31 15:33:41 - Management - Send 'signal SIGTERM'. 2017.01.31 15:33:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.31 15:33:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.31 15:33:41 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.31 15:33:46 - OpenVPN > /usr/bin/ip route del 62.102.148.151/32. 2017.01.31 15:33:46 - OpenVPN > /usr/bin/ip route del 0.0.0.0/1. 2017.01.31 15:33:46 - OpenVPN > /usr/bin/ip route del 128.0.0.0/1. 2017.01.31 15:33:46 - OpenVPN > Closing TUN/TAP interface. 2017.01.31 15:33:46 - OpenVPN > /usr/bin/ip addr del dev tun0 10.4.20.69/16. 2017.01.31 15:33:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.31 15:33:46 - Connection terminated.. 2017.01.31 15:33:46 - DNS of the system restored to original settings (Rename method)I 2017.01.31 15:33:47 - Cancel requested.! 2017.01.31 15:33:47 - Session terminated.I 2017.01.31 15:34:31 - Session starting.. 2017.01.31 15:34:31 - Unable to understand if IPv6 is active.I 2017.01.31 15:34:31 - Checking authorization .... 2017.01.31 15:34:32 - DNS of the system will be updated to VPN DNS (ResolvConf method)! 2017.01.31 15:34:32 - Connecting to Alrami (Sweden, Uppsala). 2017.01.31 15:34:32 - OpenVPN > OpenVPN 2.4.0 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 28 2016. 2017.01.31 15:34:32 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.31 15:34:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.31 15:34:32 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts. 2017.01.31 15:34:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.145:443. 2017.01.31 15:34:32 - OpenVPN > Socket Buffers: R=[212992->425984] S=[212992->425984]. 2017.01.31 15:34:32 - OpenVPN > UDP link local: (not bound). 2017.01.31 15:34:32 - OpenVPN > UDP link remote: [AF_INET]62.102.148.145:443. 2017.01.31 15:34:32 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=3d6fc996 d810fe74. 2017.01.31 15:34:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.31 15:34:32 - OpenVPN > Validating certificate key usage. 2017.01.31 15:34:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.31 15:34:32 - OpenVPN > VERIFY KU OK. 2017.01.31 15:34:32 - OpenVPN > Validating certificate extended key usage. 2017.01.31 15:34:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.31 15:34:32 - OpenVPN > VERIFY EKU OK. 2017.01.31 15:34:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.31 15:34:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.31 15:34:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443. 2017.01.31 15:34:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.31 15:34:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.239 255.255.0.0'. 2017.01.31 15:34:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.31 15:34:34 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.31 15:34:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.31 15:34:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.31 15:34:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.31 15:34:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.31 15:34:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:34:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:34:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:34 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eno1 HWADDR=ac:22:0b:4b:9e:1d. 2017.01.31 15:34:34 - OpenVPN > TUN/TAP device tun0 opened. 2017.01.31 15:34:34 - OpenVPN > TUN/TAP TX queue length set to 100. 2017.01.31 15:34:34 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.31 15:34:34 - OpenVPN > /usr/bin/ip link set dev tun0 up mtu 1500. 2017.01.31 15:34:34 - OpenVPN > /usr/bin/ip addr add dev tun0 10.4.1.239/16 broadcast 10.4.255.255. 2017.01.31 15:34:34 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.1.239 255.255.0.0 init. 2017.01.31 15:34:34 - OpenVPN > dhcp-option DNS 10.4.0.1. 2017.01.31 15:34:39 - OpenVPN > /usr/bin/ip route add 62.102.148.145/32 via 192.168.1.1. 2017.01.31 15:34:39 - OpenVPN > /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1. 2017.01.31 15:34:39 - OpenVPN > /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1. 2017.01.31 15:34:39 - Starting Management Interface. 2017.01.31 15:34:39 - OpenVPN > Initialization Sequence CompletedI 2017.01.31 15:34:39 - Checking routeI 2017.01.31 15:34:40 - Checking DNSE 2017.01.31 15:34:41 - Checking DNS don't match. 2017.01.31 15:34:41 - Checking DNS (2° try)E 2017.01.31 15:34:42 - Checking DNS don't match. 2017.01.31 15:34:42 - Checking DNS (3° try)E 2017.01.31 15:34:45 - Checking DNS don't matchE 2017.01.31 15:34:45 - DNS checking failed.. 2017.01.31 15:34:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2017.01.31 15:34:45 - Disconnecting. 2017.01.31 15:34:45 - Management - Send 'signal SIGTERM'. 2017.01.31 15:34:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.31 15:34:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.31 15:34:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.31 15:34:50 - OpenVPN > /usr/bin/ip route del 62.102.148.145/32. 2017.01.31 15:34:50 - OpenVPN > /usr/bin/ip route del 0.0.0.0/1. 2017.01.31 15:34:50 - OpenVPN > /usr/bin/ip route del 128.0.0.0/1. 2017.01.31 15:34:50 - OpenVPN > Closing TUN/TAP interface. 2017.01.31 15:34:50 - OpenVPN > /usr/bin/ip addr del dev tun0 10.4.1.239/16. 2017.01.31 15:34:50 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.1.239 255.255.0.0 init. 2017.01.31 15:34:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.31 15:34:50 - Connection terminated.I 2017.01.31 15:34:53 - Checking authorization .... 2017.01.31 15:34:53 - DNS of the system will be updated to VPN DNS (ResolvConf method)! 2017.01.31 15:34:53 - Connecting to Atria (Sweden, Uppsala). 2017.01.31 15:34:53 - OpenVPN > OpenVPN 2.4.0 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 28 2016. 2017.01.31 15:34:53 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.01.31 15:34:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.31 15:34:53 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts. 2017.01.31 15:34:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.150:443. 2017.01.31 15:34:53 - OpenVPN > Socket Buffers: R=[212992->425984] S=[212992->425984]. 2017.01.31 15:34:53 - OpenVPN > UDP link local: (not bound). 2017.01.31 15:34:53 - OpenVPN > UDP link remote: [AF_INET]62.102.148.150:443. 2017.01.31 15:34:53 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=f371d306 b4780047. 2017.01.31 15:34:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.31 15:34:54 - OpenVPN > Validating certificate key usage. 2017.01.31 15:34:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.31 15:34:54 - OpenVPN > VERIFY KU OK. 2017.01.31 15:34:54 - OpenVPN > Validating certificate extended key usage. 2017.01.31 15:34:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.31 15:34:54 - OpenVPN > VERIFY EKU OK. 2017.01.31 15:34:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.01.31 15:34:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.31 15:34:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443. 2017.01.31 15:34:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.01.31 15:34:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.238 255.255.0.0'. 2017.01.31 15:34:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.31 15:34:55 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.01.31 15:34:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.31 15:34:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.31 15:34:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.31 15:34:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.31 15:34:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:34:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.31 15:34:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.31 15:34:55 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eno1 HWADDR=ac:22:0b:4b:9e:1d. 2017.01.31 15:34:56 - OpenVPN > TUN/TAP device tun0 opened. 2017.01.31 15:34:56 - OpenVPN > TUN/TAP TX queue length set to 100. 2017.01.31 15:34:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.01.31 15:34:56 - OpenVPN > /usr/bin/ip link set dev tun0 up mtu 1500. 2017.01.31 15:34:56 - OpenVPN > /usr/bin/ip addr add dev tun0 10.4.7.238/16 broadcast 10.4.255.255. 2017.01.31 15:34:56 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.7.238 255.255.0.0 init. 2017.01.31 15:34:56 - OpenVPN > dhcp-option DNS 10.4.0.1. 2017.01.31 15:35:01 - OpenVPN > /usr/bin/ip route add 62.102.148.150/32 via 192.168.1.1. 2017.01.31 15:35:01 - OpenVPN > /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1. 2017.01.31 15:35:01 - OpenVPN > /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1. 2017.01.31 15:35:01 - Starting Management Interface. 2017.01.31 15:35:01 - OpenVPN > Initialization Sequence CompletedI 2017.01.31 15:35:01 - Checking routeI 2017.01.31 15:35:02 - Checking DNSE 2017.01.31 15:35:03 - Checking DNS don't match. 2017.01.31 15:35:03 - Checking DNS (2° try)E 2017.01.31 15:35:04 - Checking DNS don't match. 2017.01.31 15:35:04 - Checking DNS (3° try)E 2017.01.31 15:35:07 - Checking DNS don't matchE 2017.01.31 15:35:07 - DNS checking failed.. 2017.01.31 15:35:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2017.01.31 15:35:07 - Disconnecting. 2017.01.31 15:35:07 - Management - Send 'signal SIGTERM'. 2017.01.31 15:35:07 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.01.31 15:35:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.01.31 15:35:07 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.01.31 15:35:13 - OpenVPN > /usr/bin/ip route del 62.102.148.150/32. 2017.01.31 15:35:13 - OpenVPN > /usr/bin/ip route del 0.0.0.0/1. 2017.01.31 15:35:13 - OpenVPN > /usr/bin/ip route del 128.0.0.0/1. 2017.01.31 15:35:13 - OpenVPN > Closing TUN/TAP interface. 2017.01.31 15:35:13 - OpenVPN > /usr/bin/ip addr del dev tun0 10.4.7.238/16. 2017.01.31 15:35:13 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.7.238 255.255.0.0 init. 2017.01.31 15:35:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.01.31 15:35:13 - Connection terminated.I 2017.01.31 15:35:15 - Cancel requested.! 2017.01.31 15:35:15 - Session terminated.! 2017.01.31 15:35:33 - Deactivation of Network Lock. 2017.01.31 15:35:38 - Shutdown in progress. 2017.01.31 15:35:39 - Shutdown complete I have faced the same problem with Antergos (Arch). Unchecking that box fixed it, but I am still on 2.11.14 as I wait for 2.11.15 package in AUR. Share this post Link to post
Penlane 0 Posted ... Hello there, I have a small visual bug with the OSX version. The public exit IP is displayed correctly, the country is wrong however. It says I am connected to the Netherlands, but actually I am connected to the UK https://puu.sh/tOtFC/c20fa46607.png Other than that, thank you! Works absolutely great and no DNS Leaks on either my Windows and UNIX machines (Mac,Ubuntu) Share this post Link to post
4 Posted ... The new client works well I love having the options on the left side 2 Nasdaq and 333_half_evil reacted to this Share this post Link to post
~Daniel~ 11 Posted ... Not sure if this is the right place to file a "bug report", so hopefully this is okay. I don't think this issue issue started with Eddie 2.11.15, as I am sure I had noticed this issue with an earlier "experimental" 2.11 build; however, I wasn't confident I had a repeatable set of steps to reproduce the issue until now:Note: I think it's important to mention I am running Win10 and have all the Windows options enabled in Eddie's General=>Microsoft Windows Only settings area.Test 1 Launch Eddie... sys-tray icon loads, no visible signs of Eddie client (as expected with setting mentioned above) Right-Click the sys-tray icon and select Exit... sys-tray icon disappears (expected) Try launch Eddie again.... Eddie reports it is already running (not expected) Start task manager and manually terminate (end task) Eddie - Windows UI Return to Step 1 to see the cycle repeat (although sometimes it works) Test 2 Launch Eddie... sys-tray icon loads, no visible signs of Eddie client (as expected with setting mentioned above) Right-Click the sys-tray icon and select Show Main Window Select dropdown from client (looks alot like the sys-tray right-click context menu) and choose Exit Try launch Eddie again.... Eddie reports it is already running (not expected) Start task manager and manually terminate (end task) Eddie - Windows UI Return to Step 7 to see the cycle repeat (although sometimes it works) Test 3 Launch Eddie... sys-tray icon loads, no visible signs of Eddie client (as expected with setting mentioned above) Right-Click the sys-tray icon and select Show Main Window Click "X" to close client (ungraceful exit?) Try launch Eddie again.... Eddie reports it is already running (not expected) Start task manager and manually terminate (end task) Eddie - Windows UI Return to Step 14 to see the cycle repeat (although sometimes it works)What was expected?Eddie - Windows UI process to always close/exit when a choice to Exit is selected/made. (not sure if this can apply to the "ungraceful exit") What actually happened?Eddie - Windows UI process remains running the majority of times a choice to Exit is selected. Impact of what happened?Prevents re-launching client until process is terminated manually. Workaround?None that are reliable... the 3 tests mentioned show workarounds I tried but they only appeared to reproduce the error. I did try disabling two options (Start minimized and Minimize in tray icon) but the intermittent issue of not closing AirVPN.exe from the process list remained. 1 LZ1 reacted to this Share this post Link to post
Guest Posted ... Thank You for tweaking the startup and connection times!Always had the problem that it took a while with "Network Lock" on to open up and connect to a server.Software like Steam were always faster than AirVPN and I had to re-login into my Steam account every time when I booted my PC.So THANK YOU very much for making Eddie great again! (I had the client on my SSD the whole time and have an 400 Mbit/s internet connection [even though I only get 210 Mbit/s w. AirVPN out of my 410 Mbit/s what I get without VPN ((]) I had this issue too. I wrote a small batch script that runs on the VPN Up event to start Steam and any other applications that suffer from the same problem: @echo off pushd tasklist /nh /fi "imagename eq steam.exe" | find /i "steam.exe" > nul ||(start "Steam" "C:\Program Files (x86)\Steam\steam.exe" -silent) 1 yaranaika reacted to this Share this post Link to post
Bubo 1 Posted ... (edited) Not working in W-Vista hp x64 with a wfp error, see attachment.There was a check box for wfp in the beta's but I'm not seeing it. Regards,Bubo Ok,in settings>advanced>IPv6> change to None solves issue, not the best work around but works. Edited ... by Bubo Share this post Link to post
internet_user 6 Posted ... (edited) Is just me saying that this version slow? (windows 10) my chrome keeps saying: Your connection was interrupted A network change was detected.ERR_NETWORK_CHANGED Update: its related to "Ensure DNS lock" check box, if checked always cause problem... (yeah i know if uncheck will exposed my dns) update2: disable ipv6 completely on windows 10 seems solved this. (not sure its related). AirVpn fast again Edited ... by internet_user Share this post Link to post
~Daniel~ 11 Posted ... hmm, I wonder if this could have also been achieved using the "Disable IPv6 at OS level if requested" advanced Eddie option?update2: disable ipv6 completely on windows 10 seems solved this. (not sure its related). AirVpn fast again Share this post Link to post
LZ1 672 Posted ... The logs-area UI is acting quite glitchy at times, in 2.11.15, when receiving errors, such as when not able to connect to WiFi.Logs appearing and disappearing quickly due to the fast scroll. Scroll bar which can't be moved out of its position and such.This is in Mint 18.Just thought you might want to know, just in case . Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
UncleHunto 6 Posted ... I have had a couple more problems with Eddie 2.11.15 Stable recently, On my Manjaro 64-bit Cinnamon Community Editon system. Eddie had been running smoothly for a few days, and then when I woke up in the morning, the GUI had disappeared, and it seemed like the connection to Eddie servers had been dropped, but network lock had remained in effect, because I could not connect to the internet, and all ping tests failed. I rebooted my system, and Eddie was working again. Here are my logs from then:Logs. 2017.02.05 00:00:20 - Updating systems & servers data .... 2017.02.05 00:00:22 - Systems & servers data update completed. 2017.02.05 00:10:22 - Updating systems & servers data .... 2017.02.05 00:10:23 - Systems & servers data update completed. 2017.02.05 00:20:24 - Updating systems & servers data .... 2017.02.05 00:20:25 - Systems & servers data update completed. 2017.02.05 00:30:25 - Updating systems & servers data .... 2017.02.05 00:30:27 - Systems & servers data update completedI 2017.02.05 00:40:00 - Renewing TLS key. 2017.02.05 00:40:00 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 00:40:01 - OpenVPN > TLS: soft reset sec=0 bytes=2218177968/-1 pkts=2401820/0. 2017.02.05 00:40:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 00:40:01 - OpenVPN > Validating certificate key usage. 2017.02.05 00:40:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 00:40:01 - OpenVPN > VERIFY KU OK. 2017.02.05 00:40:01 - OpenVPN > Validating certificate extended key usage. 2017.02.05 00:40:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 00:40:01 - OpenVPN > VERIFY EKU OK. 2017.02.05 00:40:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 00:40:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 00:40:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 00:40:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 00:40:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 00:40:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 00:40:27 - Updating systems & servers data .... 2017.02.05 00:40:29 - Systems & servers data update completed. 2017.02.05 00:50:29 - Updating systems & servers data .... 2017.02.05 00:50:30 - Systems & servers data update completed. 2017.02.05 01:00:31 - Updating systems & servers data .... 2017.02.05 01:00:32 - Systems & servers data update completed. 2017.02.05 01:10:32 - Updating systems & servers data .... 2017.02.05 01:10:34 - Systems & servers data update completed. 2017.02.05 01:20:34 - Updating systems & servers data .... 2017.02.05 01:20:36 - Systems & servers data update completed. 2017.02.05 01:30:36 - Updating systems & servers data .... 2017.02.05 01:30:37 - Systems & servers data update completedI 2017.02.05 01:40:01 - Renewing TLS key. 2017.02.05 01:40:01 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 01:40:02 - OpenVPN > TLS: soft reset sec=0 bytes=2095708629/-1 pkts=2261266/0. 2017.02.05 01:40:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 01:40:02 - OpenVPN > Validating certificate key usage. 2017.02.05 01:40:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 01:40:02 - OpenVPN > VERIFY KU OK. 2017.02.05 01:40:02 - OpenVPN > Validating certificate extended key usage. 2017.02.05 01:40:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 01:40:02 - OpenVPN > VERIFY EKU OK. 2017.02.05 01:40:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 01:40:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 01:40:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 01:40:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 01:40:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 01:40:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 01:40:38 - Updating systems & servers data .... 2017.02.05 01:40:39 - Systems & servers data update completed. 2017.02.05 01:50:39 - Updating systems & servers data .... 2017.02.05 01:50:41 - Systems & servers data update completed. 2017.02.05 02:00:41 - Updating systems & servers data .... 2017.02.05 02:00:43 - Systems & servers data update completed. 2017.02.05 02:10:43 - Updating systems & servers data .... 2017.02.05 02:10:44 - Systems & servers data update completed. 2017.02.05 02:20:45 - Updating systems & servers data .... 2017.02.05 02:20:47 - Systems & servers data update completed. 2017.02.05 02:30:47 - Updating systems & servers data .... 2017.02.05 02:30:51 - Systems & servers data update completedI 2017.02.05 02:40:02 - Renewing TLS key. 2017.02.05 02:40:02 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 02:40:03 - OpenVPN > TLS: soft reset sec=0 bytes=1888770186/-1 pkts=2024103/0. 2017.02.05 02:40:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 02:40:03 - OpenVPN > Validating certificate key usage. 2017.02.05 02:40:03 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 02:40:03 - OpenVPN > VERIFY KU OK. 2017.02.05 02:40:03 - OpenVPN > Validating certificate extended key usage. 2017.02.05 02:40:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 02:40:03 - OpenVPN > VERIFY EKU OK. 2017.02.05 02:40:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 02:40:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 02:40:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 02:40:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 02:40:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 02:40:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 02:40:52 - Updating systems & servers data .... 2017.02.05 02:40:53 - Systems & servers data update completed. 2017.02.05 02:50:53 - Updating systems & servers data .... 2017.02.05 02:50:55 - Systems & servers data update completed. 2017.02.05 03:00:55 - Updating systems & servers data .... 2017.02.05 03:00:57 - Systems & servers data update completed. 2017.02.05 03:10:57 - Updating systems & servers data .... 2017.02.05 03:10:58 - Systems & servers data update completed. 2017.02.05 03:20:59 - Updating systems & servers data .... 2017.02.05 03:21:00 - Systems & servers data update completed. 2017.02.05 03:31:00 - Updating systems & servers data .... 2017.02.05 03:31:02 - Systems & servers data update completedI 2017.02.05 03:40:03 - Renewing TLS key. 2017.02.05 03:40:03 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 03:40:04 - OpenVPN > TLS: soft reset sec=0 bytes=1961411633/-1 pkts=2101544/0. 2017.02.05 03:40:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 03:40:04 - OpenVPN > Validating certificate key usage. 2017.02.05 03:40:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 03:40:04 - OpenVPN > VERIFY KU OK. 2017.02.05 03:40:04 - OpenVPN > Validating certificate extended key usage. 2017.02.05 03:40:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 03:40:04 - OpenVPN > VERIFY EKU OK. 2017.02.05 03:40:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 03:40:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 03:40:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 03:40:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 03:40:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 03:40:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 03:41:02 - Updating systems & servers data .... 2017.02.05 03:41:04 - Systems & servers data update completed. 2017.02.05 03:51:04 - Updating systems & servers data .... 2017.02.05 03:51:05 - Systems & servers data update completed. 2017.02.05 04:01:06 - Updating systems & servers data .... 2017.02.05 04:01:07 - Systems & servers data update completed. 2017.02.05 04:11:07 - Updating systems & servers data .... 2017.02.05 04:11:09 - Systems & servers data update completed. 2017.02.05 04:21:09 - Updating systems & servers data .... 2017.02.05 04:21:11 - Systems & servers data update completed. 2017.02.05 04:31:11 - Updating systems & servers data .... 2017.02.05 04:31:13 - Systems & servers data update completedI 2017.02.05 04:40:04 - Renewing TLS key. 2017.02.05 04:40:04 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 04:40:05 - OpenVPN > TLS: soft reset sec=0 bytes=2151764992/-1 pkts=2318616/0. 2017.02.05 04:40:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 04:40:05 - OpenVPN > Validating certificate key usage. 2017.02.05 04:40:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 04:40:05 - OpenVPN > VERIFY KU OK. 2017.02.05 04:40:05 - OpenVPN > Validating certificate extended key usage. 2017.02.05 04:40:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 04:40:05 - OpenVPN > VERIFY EKU OK. 2017.02.05 04:40:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 04:40:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 04:40:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 04:40:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 04:40:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 04:40:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 04:41:13 - Updating systems & servers data .... 2017.02.05 04:41:14 - Systems & servers data update completed. 2017.02.05 04:51:14 - Updating systems & servers data .... 2017.02.05 04:51:16 - Systems & servers data update completed. 2017.02.05 05:01:16 - Updating systems & servers data .... 2017.02.05 05:01:18 - Systems & servers data update completed. 2017.02.05 05:11:18 - Updating systems & servers data .... 2017.02.05 05:11:20 - Systems & servers data update completed. 2017.02.05 05:21:20 - Updating systems & servers data .... 2017.02.05 05:21:21 - Systems & servers data update completed. 2017.02.05 05:31:22 - Updating systems & servers data .... 2017.02.05 05:31:23 - Systems & servers data update completedI 2017.02.05 05:40:05 - Renewing TLS key. 2017.02.05 05:40:05 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 05:40:06 - OpenVPN > TLS: soft reset sec=0 bytes=2125225452/-1 pkts=2346723/0. 2017.02.05 05:40:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 05:40:06 - OpenVPN > Validating certificate key usage. 2017.02.05 05:40:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 05:40:06 - OpenVPN > VERIFY KU OK. 2017.02.05 05:40:06 - OpenVPN > Validating certificate extended key usage. 2017.02.05 05:40:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 05:40:06 - OpenVPN > VERIFY EKU OK. 2017.02.05 05:40:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 05:40:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 05:40:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 05:40:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 05:40:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 05:40:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 05:41:23 - Updating systems & servers data .... 2017.02.05 05:41:25 - Systems & servers data update completed. 2017.02.05 05:51:25 - Updating systems & servers data .... 2017.02.05 05:51:27 - Systems & servers data update completed. 2017.02.05 06:01:27 - Updating systems & servers data .... 2017.02.05 06:01:29 - Systems & servers data update completed. 2017.02.05 06:11:29 - Updating systems & servers data .... 2017.02.05 06:11:30 - Systems & servers data update completed. 2017.02.05 06:21:31 - Updating systems & servers data .... 2017.02.05 06:21:32 - Systems & servers data update completed. 2017.02.05 06:31:32 - Updating systems & servers data .... 2017.02.05 06:31:34 - Systems & servers data update completedI 2017.02.05 06:40:06 - Renewing TLS key. 2017.02.05 06:40:06 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 06:40:07 - OpenVPN > TLS: soft reset sec=0 bytes=2086823922/-1 pkts=2304701/0. 2017.02.05 06:40:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 06:40:07 - OpenVPN > Validating certificate key usage. 2017.02.05 06:40:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 06:40:07 - OpenVPN > VERIFY KU OK. 2017.02.05 06:40:07 - OpenVPN > Validating certificate extended key usage. 2017.02.05 06:40:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 06:40:07 - OpenVPN > VERIFY EKU OK. 2017.02.05 06:40:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 06:40:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 06:40:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 06:40:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 06:40:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 06:40:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 06:41:34 - Updating systems & servers data .... 2017.02.05 06:41:36 - Systems & servers data update completed. 2017.02.05 06:51:36 - Updating systems & servers data .... 2017.02.05 06:51:37 - Systems & servers data update completed. 2017.02.05 07:01:38 - Updating systems & servers data .... 2017.02.05 07:01:40 - Systems & servers data update completed. 2017.02.05 07:11:40 - Updating systems & servers data .... 2017.02.05 07:11:42 - Systems & servers data update completed. 2017.02.05 07:21:42 - Updating systems & servers data .... 2017.02.05 07:21:44 - Systems & servers data update completed. 2017.02.05 07:31:44 - Updating systems & servers data .... 2017.02.05 07:31:45 - Systems & servers data update completedI 2017.02.05 07:40:07 - Renewing TLS key. 2017.02.05 07:40:07 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 07:40:08 - OpenVPN > TLS: soft reset sec=0 bytes=2246613729/-1 pkts=2379173/0. 2017.02.05 07:40:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 07:40:08 - OpenVPN > Validating certificate key usage. 2017.02.05 07:40:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 07:40:08 - OpenVPN > VERIFY KU OK. 2017.02.05 07:40:08 - OpenVPN > Validating certificate extended key usage. 2017.02.05 07:40:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 07:40:08 - OpenVPN > VERIFY EKU OK. 2017.02.05 07:40:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 07:40:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 07:40:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 07:40:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 07:40:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 07:40:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 07:41:46 - Updating systems & servers data .... 2017.02.05 07:41:47 - Systems & servers data update completed. 2017.02.05 07:51:47 - Updating systems & servers data .... 2017.02.05 07:51:49 - Systems & servers data update completed. 2017.02.05 08:01:49 - Updating systems & servers data .... 2017.02.05 08:01:51 - Systems & servers data update completed. 2017.02.05 08:11:51 - Updating systems & servers data .... 2017.02.05 08:11:53 - Systems & servers data update completed. 2017.02.05 08:21:53 - Updating systems & servers data .... 2017.02.05 08:21:54 - Systems & servers data update completed. 2017.02.05 08:31:55 - Updating systems & servers data .... 2017.02.05 08:31:56 - Systems & servers data update completedI 2017.02.05 08:40:08 - Renewing TLS key. 2017.02.05 08:40:08 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 08:40:09 - OpenVPN > TLS: soft reset sec=0 bytes=3133979493/-1 pkts=3628257/0. 2017.02.05 08:40:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 08:40:09 - OpenVPN > Validating certificate key usage. 2017.02.05 08:40:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 08:40:09 - OpenVPN > VERIFY KU OK. 2017.02.05 08:40:09 - OpenVPN > Validating certificate extended key usage. 2017.02.05 08:40:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 08:40:09 - OpenVPN > VERIFY EKU OK. 2017.02.05 08:40:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 08:40:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 08:40:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 08:40:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 08:40:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 08:40:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 08:41:56 - Updating systems & servers data .... 2017.02.05 08:41:58 - Systems & servers data update completed. 2017.02.05 08:51:58 - Updating systems & servers data .... 2017.02.05 08:52:00 - Systems & servers data update completed. 2017.02.05 09:02:00 - Updating systems & servers data .... 2017.02.05 09:02:01 - Systems & servers data update completed. 2017.02.05 09:12:02 - Updating systems & servers data .... 2017.02.05 09:12:03 - Systems & servers data update completed. 2017.02.05 09:22:03 - Updating systems & servers data .... 2017.02.05 09:22:05 - Systems & servers data update completed. 2017.02.05 09:32:05 - Updating systems & servers data .... 2017.02.05 09:32:07 - Systems & servers data update completedI 2017.02.05 09:40:09 - Renewing TLS key. 2017.02.05 09:40:09 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 09:40:10 - OpenVPN > TLS: soft reset sec=0 bytes=1950766148/-1 pkts=2160804/0. 2017.02.05 09:40:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 09:40:10 - OpenVPN > Validating certificate key usage. 2017.02.05 09:40:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 09:40:10 - OpenVPN > VERIFY KU OK. 2017.02.05 09:40:10 - OpenVPN > Validating certificate extended key usage. 2017.02.05 09:40:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 09:40:10 - OpenVPN > VERIFY EKU OK. 2017.02.05 09:40:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 09:40:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 09:40:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 09:40:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 09:40:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 09:40:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 09:42:07 - Updating systems & servers data .... 2017.02.05 09:42:09 - Systems & servers data update completed. 2017.02.05 09:52:09 - Updating systems & servers data .... 2017.02.05 09:52:11 - Systems & servers data update completed. 2017.02.05 10:02:11 - Updating systems & servers data .... 2017.02.05 10:02:13 - Systems & servers data update completed. 2017.02.05 10:12:13 - Updating systems & servers data .... 2017.02.05 10:12:15 - Systems & servers data update completed. 2017.02.05 10:22:15 - Updating systems & servers data .... 2017.02.05 10:22:19 - Systems & servers data update completed. 2017.02.05 10:32:19 - Updating systems & servers data .... 2017.02.05 10:32:21 - Systems & servers data update completedI 2017.02.05 10:40:10 - Renewing TLS key. 2017.02.05 10:40:10 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 10:40:11 - OpenVPN > TLS: soft reset sec=0 bytes=1579743001/-1 pkts=1621628/0. 2017.02.05 10:40:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 10:40:11 - OpenVPN > Validating certificate key usage. 2017.02.05 10:40:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 10:40:11 - OpenVPN > VERIFY KU OK. 2017.02.05 10:40:11 - OpenVPN > Validating certificate extended key usage. 2017.02.05 10:40:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 10:40:11 - OpenVPN > VERIFY EKU OK. 2017.02.05 10:40:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 10:40:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 10:40:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 10:40:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 10:40:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 10:40:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 10:42:21 - Updating systems & servers data .... 2017.02.05 10:42:25 - Systems & servers data update completed. 2017.02.05 10:52:25 - Updating systems & servers data .... 2017.02.05 10:52:26 - Systems & servers data update completed. 2017.02.05 11:02:27 - Updating systems & servers data .... 2017.02.05 11:02:28 - Systems & servers data update completed. 2017.02.05 11:12:28 - Updating systems & servers data .... 2017.02.05 11:12:30 - Systems & servers data update completed. 2017.02.05 11:22:30 - Updating systems & servers data .... 2017.02.05 11:22:32 - Systems & servers data update completed. 2017.02.05 11:32:32 - Updating systems & servers data .... 2017.02.05 11:32:33 - Systems & servers data update completedI 2017.02.05 11:40:11 - Renewing TLS key. 2017.02.05 11:40:11 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 11:40:12 - OpenVPN > TLS: soft reset sec=0 bytes=1261568385/-1 pkts=1393677/0. 2017.02.05 11:40:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 11:40:12 - OpenVPN > Validating certificate key usage. 2017.02.05 11:40:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 11:40:12 - OpenVPN > VERIFY KU OK. 2017.02.05 11:40:12 - OpenVPN > Validating certificate extended key usage. 2017.02.05 11:40:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 11:40:12 - OpenVPN > VERIFY EKU OK. 2017.02.05 11:40:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 11:40:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 11:40:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 11:40:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 11:40:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 11:40:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 11:42:34 - Updating systems & servers data .... 2017.02.05 11:42:35 - Systems & servers data update completed. 2017.02.05 11:52:36 - Updating systems & servers data .... 2017.02.05 11:52:37 - Systems & servers data update completed. 2017.02.05 12:02:37 - Updating systems & servers data .... 2017.02.05 12:02:39 - Systems & servers data update completed. 2017.02.05 12:12:39 - Updating systems & servers data .... 2017.02.05 12:12:41 - Systems & servers data update completed. 2017.02.05 12:22:41 - Updating systems & servers data .... 2017.02.05 12:22:42 - Systems & servers data update completed. 2017.02.05 12:32:42 - Updating systems & servers data .... 2017.02.05 12:32:44 - Systems & servers data update completedI 2017.02.05 12:40:12 - Renewing TLS key. 2017.02.05 12:40:12 - OpenVPN > TLS: tls_process: killed expiring key. 2017.02.05 12:40:13 - OpenVPN > TLS: soft reset sec=0 bytes=1203579853/-1 pkts=1330320/0. 2017.02.05 12:40:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.05 12:40:13 - OpenVPN > Validating certificate key usage. 2017.02.05 12:40:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.05 12:40:13 - OpenVPN > VERIFY KU OK. 2017.02.05 12:40:13 - OpenVPN > Validating certificate extended key usage. 2017.02.05 12:40:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.05 12:40:13 - OpenVPN > VERIFY EKU OK. 2017.02.05 12:40:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.05 12:40:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 12:40:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 12:40:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.05 12:40:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.05 12:40:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.05 12:42:44 - Updating systems & servers data .... 2017.02.05 12:42:46 - Systems & servers data update completed. 2017.02.05 12:52:46 - Updating systems & servers data .... 2017.02.05 12:52:48 - Systems & servers data update completed. 2017.02.05 13:02:48 - Updating systems & servers data .... 2017.02.05 13:02:49 - Systems & servers data update completed. 2017.02.05 13:12:50 - Updating systems & servers data .... 2017.02.05 13:12:51 - Systems & servers data update completed. 2017.02.05 13:22:51 - Updating systems & servers data .... 2017.02.05 13:22:53 - Systems & servers data update completed. 2017.02.05 13:32:53 - Updating systems & servers data .... 2017.02.05 13:32:55 - Systems & servers data update completed Another problem I had just recently, was that when Eddie was running, I went to disconnect, but when I clicked on the "Disconnect" button, nothing happened. I tried a few more times, but still nothing. The GUI was responsive, I could see the button being "pushed" and I could switch menus, but when I clicked on any button, nothing happned. I tried to quit, but that also did nothing, so I ended up rebooting, and then Eddie was working again. Here are my logs from then:Logs. 2017.02.07 00:06:55 - Updating systems & servers data .... 2017.02.07 00:06:56 - Systems & servers data update completed. 2017.02.07 00:16:57 - Updating systems & servers data .... 2017.02.07 00:16:58 - Systems & servers data update completed. 2017.02.07 00:26:58 - Updating systems & servers data .... 2017.02.07 00:27:00 - Systems & servers data update completed. 2017.02.07 00:37:00 - Updating systems & servers data .... 2017.02.07 00:37:02 - Systems & servers data update completed. 2017.02.07 00:47:02 - Updating systems & servers data .... 2017.02.07 00:47:04 - Systems & servers data update completed. 2017.02.07 00:50:47 - OpenVPN > TLS: soft reset sec=0 bytes=1667418971/-1 pkts=2049664/0. 2017.02.07 00:50:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.07 00:50:47 - OpenVPN > Validating certificate key usage. 2017.02.07 00:50:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.07 00:50:47 - OpenVPN > VERIFY KU OK. 2017.02.07 00:50:47 - OpenVPN > Validating certificate extended key usage. 2017.02.07 00:50:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.07 00:50:47 - OpenVPN > VERIFY EKU OK. 2017.02.07 00:50:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.07 00:50:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 00:50:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 00:50:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 00:50:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 00:50:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.07 00:57:04 - Updating systems & servers data .... 2017.02.07 00:57:09 - Systems & servers data update completed. 2017.02.07 01:07:09 - Updating systems & servers data .... 2017.02.07 01:07:10 - Systems & servers data update completed. 2017.02.07 01:17:11 - Updating systems & servers data .... 2017.02.07 01:17:12 - Systems & servers data update completed. 2017.02.07 01:27:13 - Updating systems & servers data .... 2017.02.07 01:27:14 - Systems & servers data update completed. 2017.02.07 01:37:14 - Updating systems & servers data .... 2017.02.07 01:37:16 - Systems & servers data update completed. 2017.02.07 01:47:16 - Updating systems & servers data .... 2017.02.07 01:47:18 - Systems & servers data update completed. 2017.02.07 01:50:47 - OpenVPN > TLS: soft reset sec=0 bytes=1657318477/-1 pkts=2029791/0. 2017.02.07 01:50:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.07 01:50:47 - OpenVPN > Validating certificate key usage. 2017.02.07 01:50:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.07 01:50:47 - OpenVPN > VERIFY KU OK. 2017.02.07 01:50:47 - OpenVPN > Validating certificate extended key usage. 2017.02.07 01:50:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.07 01:50:47 - OpenVPN > VERIFY EKU OK. 2017.02.07 01:50:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.07 01:50:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 01:50:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 01:50:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 01:50:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 01:50:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.07 01:57:18 - Updating systems & servers data .... 2017.02.07 01:57:19 - Systems & servers data update completed. 2017.02.07 02:07:20 - Updating systems & servers data .... 2017.02.07 02:07:21 - Systems & servers data update completed. 2017.02.07 02:17:22 - Updating systems & servers data .... 2017.02.07 02:17:23 - Systems & servers data update completed. 2017.02.07 18:13:03 - Data path: /home/uncle/.airvpn. 2017.02.07 18:13:03 - Application path: /usr/lib/AirVPN. 2017.02.07 18:13:03 - Executable path: /usr/lib/AirVPN/AirVPN.exe. 2017.02.07 18:13:03 - Command line arguments (1): path="/home/uncle/.airvpn". 2017.02.07 18:13:03 - Operating System: Unix 4.9.6.1 - Linux FATHER 4.9.6-1-MANJARO #1 SMP PREEMPT Thu Jan 26 12:29:20 UTC 2017 x86_64 GNU/LinuxI 2017.02.07 18:13:03 - OpenVPN Driver - Found, /dev/net/tunI 2017.02.07 18:13:03 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (/usr/bin/openvpn)I 2017.02.07 18:13:03 - SSH - Version: OpenSSH_7.4p1, OpenSSL 1.0.2j 26 Sep 2016 (/usr/bin/ssh)I 2017.02.07 18:13:03 - SSL - Version: stunnel 5.39 (/usr/bin/stunnel)W 2017.02.07 18:13:03 - Recovery. Unexpected crash?. 2017.02.07 18:13:03 - DNS of the system restored to original settings (Rename method)! 2017.02.07 18:13:03 - Deactivation of Network Lock! 2017.02.07 18:13:03 - Activation of Network Lock - Linux IPTables! 2017.02.07 18:13:05 - Ready. 2017.02.07 18:13:05 - Updating systems & servers data .... 2017.02.07 18:13:09 - Systems & servers data update completedI 2017.02.07 18:13:24 - Session starting.. 2017.02.07 18:13:24 - Unable to understand if IPv6 is active.I 2017.02.07 18:13:24 - Checking authorization ...! 2017.02.07 18:13:25 - Connecting to Sabik (United States, Los Angeles). 2017.02.07 18:13:25 - OpenVPN > OpenVPN 2.4.0 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 28 2016. 2017.02.07 18:13:25 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.02.07 18:13:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.07 18:13:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:13:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:13:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.241.147.34:443. 2017.02.07 18:13:25 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]. 2017.02.07 18:13:25 - OpenVPN > UDP link local: (not bound). 2017.02.07 18:13:25 - OpenVPN > UDP link remote: [AF_INET]199.241.147.34:443. 2017.02.07 18:13:25 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.147.34:443, sid=1312cce8 c366c3d3. 2017.02.07 18:13:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.07 18:13:25 - OpenVPN > Validating certificate key usage. 2017.02.07 18:13:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.07 18:13:25 - OpenVPN > VERIFY KU OK. 2017.02.07 18:13:25 - OpenVPN > Validating certificate extended key usage. 2017.02.07 18:13:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.07 18:13:25 - OpenVPN > VERIFY EKU OK. 2017.02.07 18:13:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.07 18:13:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.07 18:13:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.147.34:443. 2017.02.07 18:13:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.07 18:13:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.22 255.255.0.0'. 2017.02.07 18:13:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.07 18:13:26 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.02.07 18:13:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.07 18:13:26 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.07 18:13:26 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.07 18:13:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.07 18:13:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 18:13:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:13:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 18:13:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:13:26 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eno1 HWADDR=ac:22:0b:4b:9e:1d. 2017.02.07 18:13:26 - OpenVPN > TUN/TAP device tun0 opened. 2017.02.07 18:13:26 - OpenVPN > TUN/TAP TX queue length set to 100. 2017.02.07 18:13:26 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.02.07 18:13:26 - OpenVPN > /usr/bin/ip link set dev tun0 up mtu 1500. 2017.02.07 18:13:26 - OpenVPN > /usr/bin/ip addr add dev tun0 10.4.12.22/16 broadcast 10.4.255.255. 2017.02.07 18:13:32 - OpenVPN > /usr/bin/ip route add 199.241.147.34/32 via 192.168.1.1. 2017.02.07 18:13:32 - OpenVPN > /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1. 2017.02.07 18:13:32 - OpenVPN > /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1. 2017.02.07 18:13:32 - Starting Management Interface. 2017.02.07 18:13:32 - OpenVPN > Initialization Sequence Completed. 2017.02.07 18:13:32 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup. 2017.02.07 18:13:32 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2017.02.07 18:13:32 - Checking route! 2017.02.07 18:13:32 - Connected.. 2017.02.07 18:13:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.07 18:13:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.07 18:13:46 - Disconnecting. 2017.02.07 18:13:46 - Management - Send 'signal SIGTERM'. 2017.02.07 18:13:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.07 18:13:46 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.07 18:13:51 - OpenVPN > /usr/bin/ip route del 199.241.147.34/32. 2017.02.07 18:13:51 - OpenVPN > /usr/bin/ip route del 0.0.0.0/1. 2017.02.07 18:13:51 - OpenVPN > /usr/bin/ip route del 128.0.0.0/1. 2017.02.07 18:13:51 - OpenVPN > Closing TUN/TAP interface. 2017.02.07 18:13:51 - OpenVPN > /usr/bin/ip addr del dev tun0 10.4.12.22/16. 2017.02.07 18:13:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.07 18:13:51 - Connection terminated.. 2017.02.07 18:13:51 - DNS of the system restored to original settings (Rename method)! 2017.02.07 18:13:51 - Session terminated.I 2017.02.07 18:14:22 - Session starting.. 2017.02.07 18:14:22 - Unable to understand if IPv6 is active.I 2017.02.07 18:14:22 - Checking authorization ...! 2017.02.07 18:14:23 - Connecting to Sabik (United States, Los Angeles). 2017.02.07 18:14:23 - OpenVPN > OpenVPN 2.4.0 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 28 2016. 2017.02.07 18:14:23 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2017.02.07 18:14:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.07 18:14:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:14:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:14:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.241.147.34:443. 2017.02.07 18:14:23 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]. 2017.02.07 18:14:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.241.147.34:443 [nonblock]. 2017.02.07 18:14:24 - OpenVPN > TCP connection established with [AF_INET]199.241.147.34:443. 2017.02.07 18:14:24 - OpenVPN > TCP_CLIENT link local: (not bound). 2017.02.07 18:14:24 - OpenVPN > TCP_CLIENT link remote: [AF_INET]199.241.147.34:443. 2017.02.07 18:14:24 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.147.34:443, sid=92bce1f6 addc7497. 2017.02.07 18:14:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.07 18:14:24 - OpenVPN > Validating certificate key usage. 2017.02.07 18:14:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.07 18:14:24 - OpenVPN > VERIFY KU OK. 2017.02.07 18:14:24 - OpenVPN > Validating certificate extended key usage. 2017.02.07 18:14:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.07 18:14:24 - OpenVPN > VERIFY EKU OK. 2017.02.07 18:14:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.07 18:14:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.07 18:14:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.147.34:443. 2017.02.07 18:14:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.07 18:14:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.3.229 255.255.0.0'. 2017.02.07 18:14:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.07 18:14:27 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.02.07 18:14:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.07 18:14:27 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.07 18:14:27 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.07 18:14:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.07 18:14:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 18:14:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:14:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.07 18:14:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.07 18:14:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eno1 HWADDR=ac:22:0b:4b:9e:1d. 2017.02.07 18:14:27 - OpenVPN > TUN/TAP device tun0 opened. 2017.02.07 18:14:27 - OpenVPN > TUN/TAP TX queue length set to 100. 2017.02.07 18:14:27 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.02.07 18:14:27 - OpenVPN > /usr/bin/ip link set dev tun0 up mtu 1500. 2017.02.07 18:14:27 - OpenVPN > /usr/bin/ip addr add dev tun0 10.5.3.229/16 broadcast 10.5.255.255. 2017.02.07 18:14:32 - OpenVPN > /usr/bin/ip route add 199.241.147.34/32 via 192.168.1.1. 2017.02.07 18:14:32 - OpenVPN > /usr/bin/ip route add 0.0.0.0/1 via 10.5.0.1. 2017.02.07 18:14:32 - OpenVPN > /usr/bin/ip route add 128.0.0.0/1 via 10.5.0.1. 2017.02.07 18:14:32 - Starting Management Interface. 2017.02.07 18:14:32 - OpenVPN > Initialization Sequence Completed. 2017.02.07 18:14:32 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup. 2017.02.07 18:14:32 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2017.02.07 18:14:32 - Checking route! 2017.02.07 18:14:32 - Connected.. 2017.02.07 18:14:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.07 18:14:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info Share this post Link to post
Hodgie 0 Posted ... I'm currently trialling airVPN and have a small problem with EDDIE (I'm running WIN10). When I disconnect and close it down it keeps running in the background.I can't bring it back up or start it again (this is when it tells me it'a already running).The only way I've found to stop it is cntr-alt-del and end task.I seem to be missing something.Regards Share this post Link to post
LZ1 672 Posted ... I'm currently trialling airVPN and have a small problem with EDDIE (I'm running WIN10). When I disconnect and close it down it keeps running in the background.I can't bring it back up or start it again (this is when it tells me it'a already running).The only way I've found to stop it is cntr-alt-del and end task.I seem to be missing something.RegardsWelcome to AirVPN! Are you closing it down via its own menus? You could open the task list and pin it to the quickstart menu as a way of getting access quickly when you need to shut it down. Otherwise, you can submit a support ticket in the Client Area, for the support team to take a look. Just go to the Eddie logs and click the lifebelt icon and put the copied contents into the support ticket . Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
~Daniel~ 11 Posted ... I'm currently trialling airVPN and have a small problem with EDDIE (I'm running WIN10). When I disconnect and close it down it keeps running in the background.I can't bring it back up or start it again (this is when it tells me it'a already running).The only way I've found to stop it is cntr-alt-del and end task.I seem to be missing something.RegardsNo you're not missing anything, see my post on page 2. Share this post Link to post
Khariz 109 Posted ... Yep, happens for me too. Eddie is not closing any more upon disconnect and close. I always have to kill the remnants of it from the Task Manager. It's just a bug. 1 trev reacted to this Share this post Link to post
tenpoundbrain 0 Posted ... Very nice I like the GUI update looks meatier. Thumbs up on the re-work for missing dependencies in certain distros of linux based OS, all around nice Job. User ability is paramount these days as more and more people flock to privacy from prying eyes.bububu bu bu im loving it! Share this post Link to post
flat4 79 Posted ... Very nice I like the GUI update looks meatier. That's what she said!! Sorry could not pass up. Hide flat4's signature Hide all signatures pFsense it works Share this post Link to post
somkind2 0 Posted ... Basic user question- how different is windows filtering network lock V windows firewall lock? I need most complete lock on everything? Thank Share this post Link to post
suslog 0 Posted ... (edited) Grateful for your work and continuous improvement. However, I do face a persistent problem. Uninstalled a working version of Eddie 2.10 to install Eddie 2.11 on Windows 10, but Server and Countries list remain empty. Uninstalled and reinstalled 2.10 and 2.11 multiple times, tried Portable version, but to no avail. Removed AirVPN.xml from C:\Users\[user]\AppData\Local\AirVPN, reinstallation et cetera. Had to login again, but now receiving a recurring error on my login saying "Length of the data to decrypt is invalid". Even after changing password on the AirVPN-website. Basically, I'm at a loss to get AirVPN up and running again.Other issues: Exit doesn't truly exit on 2.11 as AirVPN remains running according to Task Manager and requires an End Task command. Furthermore, with 2.10, DNS was often not automatically reset with 10.4.0.1 being persistent under IP4 properties. Update:I contacted support, shared a log and got a reply, but managed to find a resolution to the problem myself. Turns out another VPN client 'FortiClient', although not active, was interfering with AirVPN's Eddie. Although both have been installed and used intermittently for over a year now, only since I updated to 2.11 the problem occurred. Not sure whether there is any logic to it (I do see some logging on Proxy Avoidance Violation in FortiClient), or just a freak incident, but after disabling FortiClient I could use AirVPN again with Eddie. The good stuff is that I still could get access to the servers using OpenVPN, a third client. I hope this will be of benefit to one of you. Edited ... by suslog Share this post Link to post
sableslayer 1 Posted ... Thank you for updating the client. It works on mint now. I had to use another shitty provider cause i couldnt get older versions of yalls client to work, but now its perfect. =)) TY again! Share this post Link to post