ninja890 0 Posted ... Hey everyone, Quite new to vpn's and so far really happy with airvpn! However, I'm experiencing a small problem: i cant connect to ipleak.net anymore. Before I could, but I was having the disconnection problem whenever i was not connected to eddie. Changed the DNS to automatic in ipv4. Solved the first problem but now i cant connect to ipleak.net anymore. Not a major problem, but it stops me from being able to check if everything works as intended. Any fixes for this? Logs below I 2017.02.01 14:06:12 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2017.02.01 14:06:12 - Reading options from C:\Users\UN\AppData\Local\AirVPN\AirVPN.xml. 2017.02.01 14:06:12 - Data Path: C:\Users\UN\AppData\Local\AirVPN. 2017.02.01 14:06:12 - App Path: E:\Programmas\AirVPN. 2017.02.01 14:06:12 - Executable Path: E:\Programmas\AirVPN\AirVPN.exe. 2017.02.01 14:06:12 - Command line arguments (1): path="home". 2017.02.01 14:06:12 - Operating System: Microsoft Windows NT 6.2.9200.0. 2017.02.01 14:06:12 - Updating systems & servers data .... 2017.02.01 14:06:12 - Systems & servers data update completedI 2017.02.01 14:06:14 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2017.02.01 14:06:14 - OpenVPN - Version: OpenVPN 2.3.8 (E:\Programmas\AirVPN\openvpn.exe)I 2017.02.01 14:06:14 - SSH - Version: plink 0.63 (E:\Programmas\AirVPN\plink.exe)I 2017.02.01 14:06:14 - SSL - Version: stunnel 5.17 (E:\Programmas\AirVPN\stunnel.exe)I 2017.02.01 14:06:14 - Session starting.I 2017.02.01 14:06:14 - IPv6 disabled.I 2017.02.01 14:06:21 - Checking authorization ...! 2017.02.01 14:06:21 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:06:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:06:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:06:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:06:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:06:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:06:21 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:06:21 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:06:21 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=ada043d8 29fd34f0. 2017.02.01 14:06:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:06:21 - OpenVPN > Validating certificate key usage. 2017.02.01 14:06:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:06:21 - OpenVPN > VERIFY KU OK. 2017.02.01 14:06:21 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:06:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:06:21 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:06:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:06:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:06:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:06:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:06:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:06:22 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:06:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:06:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:06:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:06:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:06:24 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:06:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:06:24 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:06:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:06:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:06:24 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:06:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:06:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:06:29 - Starting Management Interface. 2017.02.01 14:06:29 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:06:29 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:06:29 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:06:30 - Flushing DNSI 2017.02.01 14:06:30 - Checking routeI 2017.02.01 14:06:54 - Checking DNS! 2017.02.01 14:06:54 - Connected.. 2017.02.01 14:06:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:06:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:06:54 - Disconnecting. 2017.02.01 14:06:54 - Management - Send 'signal SIGTERM'. 2017.02.01 14:06:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:06:54 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:06:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:06:59 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:06:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:06:59 - Connection terminated.I 2017.02.01 14:06:59 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:06:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:06:59 - IPv6 restored.! 2017.02.01 14:06:59 - Session terminated.I 2017.02.01 14:07:23 - Session starting.I 2017.02.01 14:07:23 - IPv6 disabled.I 2017.02.01 14:07:23 - Checking authorization ...! 2017.02.01 14:07:23 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:07:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:07:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:07:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:07:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:07:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:07:24 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:07:24 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:07:24 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=c5d35201 5082ec58. 2017.02.01 14:07:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:07:24 - OpenVPN > Validating certificate key usage. 2017.02.01 14:07:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:07:24 - OpenVPN > VERIFY KU OK. 2017.02.01 14:07:24 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:07:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:07:24 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:07:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:07:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:07:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:07:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:07:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:07:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:07:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:07:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:07:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:07:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:07:26 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:07:26 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:07:26 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:07:26 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:07:26 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:07:26 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:07:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:07:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:07:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:07:31 - Starting Management Interface. 2017.02.01 14:07:31 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:07:31 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:07:31 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:07:31 - Flushing DNSI 2017.02.01 14:07:31 - Checking routeI 2017.02.01 14:07:43 - Checking DNS! 2017.02.01 14:07:43 - Connected.. 2017.02.01 14:07:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:07:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:17:36 - Disconnecting. 2017.02.01 14:17:36 - Management - Send 'signal SIGTERM'. 2017.02.01 14:17:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:17:36 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:17:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:17:41 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:17:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:17:41 - Connection terminated.I 2017.02.01 14:17:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:17:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:17:41 - IPv6 restored.! 2017.02.01 14:17:41 - Session terminated.I 2017.02.01 14:18:31 - Session starting.I 2017.02.01 14:18:31 - IPv6 disabled.I 2017.02.01 14:18:31 - Checking authorization ...! 2017.02.01 14:18:31 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:18:32 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:18:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:18:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:18:32 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:18:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:18:32 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:18:32 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:18:32 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=945951cf 3d52a05f. 2017.02.01 14:18:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:18:32 - OpenVPN > Validating certificate key usage. 2017.02.01 14:18:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:18:32 - OpenVPN > VERIFY KU OK. 2017.02.01 14:18:32 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:18:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:18:32 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:18:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:18:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:18:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:18:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:18:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:18:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:18:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:18:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:18:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:18:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:18:34 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:18:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:18:34 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:18:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:18:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:18:34 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:18:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:18:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:18:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:18:39 - Starting Management Interface. 2017.02.01 14:18:39 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:18:39 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:18:39 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:18:39 - Flushing DNSI 2017.02.01 14:18:39 - Checking routeI 2017.02.01 14:19:03 - Checking DNS! 2017.02.01 14:19:03 - Connected.. 2017.02.01 14:19:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:19:03 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:27:27 - Disconnecting. 2017.02.01 14:27:27 - Management - Send 'signal SIGTERM'. 2017.02.01 14:27:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:27:27 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:27:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:27:33 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:27:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:27:33 - Connection terminated.I 2017.02.01 14:27:33 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:27:33 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:27:33 - IPv6 restored.! 2017.02.01 14:27:33 - Session terminated.I 2017.02.01 14:27:52 - Session starting.I 2017.02.01 14:27:52 - IPv6 disabled.I 2017.02.01 14:27:52 - Checking authorization ...! 2017.02.01 14:27:52 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:27:52 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:27:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:27:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:27:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:27:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:27:52 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:27:52 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:27:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=feb214e7 4e82901d. 2017.02.01 14:27:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:27:52 - OpenVPN > Validating certificate key usage. 2017.02.01 14:27:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:27:52 - OpenVPN > VERIFY KU OK. 2017.02.01 14:27:52 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:27:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:27:52 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:27:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:27:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:27:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:27:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:27:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:27:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:27:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:27:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:27:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:27:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:27:55 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:27:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:27:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:27:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:27:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:27:55 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:28:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:28:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:28:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:28:00 - Starting Management Interface. 2017.02.01 14:28:00 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:28:00 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)I 2017.02.01 14:28:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.02.01 14:28:00 - Flushing DNSI 2017.02.01 14:28:01 - Checking routeI 2017.02.01 14:28:25 - Checking DNS! 2017.02.01 14:28:25 - Connected.. 2017.02.01 14:28:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:28:25 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:32:10 - Disconnecting. 2017.02.01 14:32:10 - Management - Send 'signal SIGTERM'. 2017.02.01 14:32:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:32:10 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:32:15 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:32:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:32:15 - Connection terminated.I 2017.02.01 14:32:15 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)I 2017.02.01 14:32:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.02.01 14:32:15 - IPv6 restored.! 2017.02.01 14:32:15 - Session terminated.I 2017.02.01 14:32:45 - Session starting.I 2017.02.01 14:32:45 - Network adapter DHCP switched to static (Realtek PCIe GBE Family Controller)I 2017.02.01 14:32:48 - IPv6 disabled.I 2017.02.01 14:32:48 - Checking authorization ...! 2017.02.01 14:32:49 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:32:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:32:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:32:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:32:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:32:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:32:49 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:32:49 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:32:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=ffa0e609 c14e2e60. 2017.02.01 14:32:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:32:49 - OpenVPN > Validating certificate key usage. 2017.02.01 14:32:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:32:49 - OpenVPN > VERIFY KU OK. 2017.02.01 14:32:49 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:32:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:32:49 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:32:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:32:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:32:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:32:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:32:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:32:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:32:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:32:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:32:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:32:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:32:51 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:32:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:32:51 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:32:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:32:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:32:51 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:32:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:32:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:32:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:32:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:32:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:32:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:32:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:32:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:32:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:32:56 - Starting Management Interface. 2017.02.01 14:32:56 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:32:56 - Flushing DNSI 2017.02.01 14:32:56 - Checking routeI 2017.02.01 14:33:20 - Checking DNS! 2017.02.01 14:33:32 - Connected.. 2017.02.01 14:33:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:33:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:34:15 - Disconnecting. 2017.02.01 14:34:15 - Management - Send 'signal SIGTERM'. 2017.02.01 14:34:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:34:15 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:34:20 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:34:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:34:20 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:34:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:34:20 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:34:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:34:20 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:34:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:34:20 - Connection terminated.I 2017.02.01 14:34:20 - IPv6 restored.I 2017.02.01 14:34:20 - DHCP of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)! 2017.02.01 14:34:20 - Session terminated.I 2017.02.01 14:35:03 - Session starting.I 2017.02.01 14:35:03 - Network adapter DHCP switched to static (Realtek PCIe GBE Family Controller)I 2017.02.01 14:35:06 - IPv6 disabled.I 2017.02.01 14:35:06 - Checking authorization ...! 2017.02.01 14:35:06 - Connecting to Miram (Netherlands, Alblasserdam). 2017.02.01 14:35:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:35:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:35:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:35:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:35:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:35:06 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:35:06 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443. 2017.02.01 14:35:06 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=e381584b 6a77185b. 2017.02.01 14:35:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:35:06 - OpenVPN > Validating certificate key usage. 2017.02.01 14:35:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:35:06 - OpenVPN > VERIFY KU OK. 2017.02.01 14:35:06 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:35:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:35:06 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:35:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:35:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:35:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:35:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:35:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:35:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443. 2017.02.01 14:35:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:35:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.194 255.255.0.0'. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:35:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:35:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:35:11 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:35:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:35:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:35:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.194/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:35:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.194/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:35:11 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:35:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:35:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:35:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:35:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:35:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:35:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:35:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:35:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:35:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:35:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:35:16 - Starting Management Interface. 2017.02.01 14:35:16 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:35:16 - Flushing DNSI 2017.02.01 14:35:16 - Checking routeI 2017.02.01 14:35:40 - Checking DNS! 2017.02.01 14:35:52 - Connected.. 2017.02.01 14:35:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:35:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.02.01 14:37:03 - Updating systems & servers data .... 2017.02.01 14:37:04 - Systems & servers data update completed. 2017.02.01 14:37:25 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065)! 2017.02.01 14:37:40 - Disconnecting. 2017.02.01 14:37:40 - Management - Send 'signal SIGTERM'. 2017.02.01 14:37:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:37:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:37:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:37:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:37:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:37:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:37:45 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:37:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:37:45 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:37:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:37:45 - Connection terminated.I 2017.02.01 14:37:45 - IPv6 restored.I 2017.02.01 14:37:45 - DHCP of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)! 2017.02.01 14:37:45 - Session terminated.I 2017.02.01 14:38:47 - Session starting.I 2017.02.01 14:38:47 - Network adapter DHCP switched to static (Realtek PCIe GBE Family Controller)I 2017.02.01 14:38:50 - IPv6 disabled.I 2017.02.01 14:38:50 - Checking authorization ...W 2017.02.01 14:38:50 - Authorization check failed, continue anyway ({1])! 2017.02.01 14:38:50 - Connecting to Kajam (Netherlands, Alblasserdam). 2017.02.01 14:38:50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:38:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:38:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:38:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:38:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:38:50 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:38:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.84:443. 2017.02.01 14:38:52 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065). 2017.02.01 14:38:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.84:443, sid=b130682f b17a1c7d. 2017.02.01 14:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:38:52 - OpenVPN > Validating certificate key usage. 2017.02.01 14:38:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:38:52 - OpenVPN > VERIFY KU OK. 2017.02.01 14:38:52 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:38:52 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org. 2017.02.01 14:38:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:38:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:38:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:38:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:38:52 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.84:443. 2017.02.01 14:38:55 - OpenVPN > SENT CONTROL [Kajam]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:38:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.102.42 255.255.0.0,peer-id 38'. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.02.01 14:38:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561. 2017.02.01 14:38:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:38:55 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:38:55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:38:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:38:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.102.42/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:38:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.102.42/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:38:55 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:39:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.84 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:39:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:39:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:39:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:39:00 - Starting Management Interface. 2017.02.01 14:39:00 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:39:00 - Flushing DNSI 2017.02.01 14:39:00 - Checking routeI 2017.02.01 14:39:00 - Checking DNS! 2017.02.01 14:39:00 - Connected.. 2017.02.01 14:39:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:39:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2017.02.01 14:45:21 - Disconnecting. 2017.02.01 14:45:21 - Management - Send 'signal SIGTERM'. 2017.02.01 14:45:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.02.01 14:45:21 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.02.01 14:45:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.84 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:45:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:45:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:45:26 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.02.01 14:45:26 - OpenVPN > Closing TUN/TAP interface. 2017.02.01 14:45:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.02.01 14:45:26 - Connection terminated.I 2017.02.01 14:45:26 - IPv6 restored.I 2017.02.01 14:45:26 - DHCP of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)! 2017.02.01 14:45:26 - Session terminated.I 2017.02.01 14:45:41 - Session starting.I 2017.02.01 14:45:41 - IPv6 disabled.I 2017.02.01 14:45:41 - Checking authorization ...! 2017.02.01 14:45:41 - Connecting to Alphard (Netherlands, Alblasserdam). 2017.02.01 14:45:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.02.01 14:45:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.02.01 14:45:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.02.01 14:45:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.02.01 14:45:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2017.02.01 14:45:41 - OpenVPN > UDPv4 link local: [undef]. 2017.02.01 14:45:41 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.9:443. 2017.02.01 14:45:41 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=c4fc16cc f8457ea2. 2017.02.01 14:45:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.02.01 14:45:41 - OpenVPN > Validating certificate key usage. 2017.02.01 14:45:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.02.01 14:45:41 - OpenVPN > VERIFY KU OK. 2017.02.01 14:45:41 - OpenVPN > Validating certificate extended key usage. 2017.02.01 14:45:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.02.01 14:45:41 - OpenVPN > VERIFY EKU OK. 2017.02.01 14:45:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.02.01 14:45:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:45:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.02.01 14:45:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.02.01 14:45:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.02.01 14:45:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.9:443. 2017.02.01 14:45:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.02.01 14:45:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.66.235 255.255.0.0'. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.02.01 14:45:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.02.01 14:45:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.02.01 14:45:45 - OpenVPN > open_tun, tt->ipv6=0. 2017.02.01 14:45:45 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}.tap. 2017.02.01 14:45:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.02.01 14:45:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.66.235/255.255.0.0 [sUCCEEDED]. 2017.02.01 14:45:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.66.235/255.255.0.0 on interface {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.02.01 14:45:45 - OpenVPN > Successful ARP Flush on interface [18] {D2F2CAAC-30DE-4014-B1DC-BABB9494A48B}. 2017.02.01 14:45:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.9 MASK 255.255.255.255 192.168.1.254. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.02.01 14:45:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2017.02.01 14:45:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.02.01 14:45:50 - Starting Management Interface. 2017.02.01 14:45:50 - OpenVPN > Initialization Sequence CompletedI 2017.02.01 14:45:50 - Flushing DNSI 2017.02.01 14:45:50 - Checking routeI 2017.02.01 14:45:50 - Checking DNS! 2017.02.01 14:45:50 - Connected.. 2017.02.01 14:45:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.02.01 14:45:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info Quote Share this post Link to post
LZ1 672 Posted ... Hello! Welcome to AirVPN! Please try and upgrade to the latest stable client . Just like when you downloaded the software the first time. It was just released, but you managed to grab the previous Stable 2.10 client haha. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
ninja890 0 Posted ... Hahaha what are the odds.. Thanks! works now Quote Share this post Link to post