Jump to content
Not connected, Your IP: 18.232.35.62
mwillis

Windows Issue - AirVPN takes 3 minutes to connect, disconnecting and reconnecting multiple times during so

Recommended Posts

Hi all,

 

I am on the 3-day trial of AirVPN and I am loving it - once I'm able to get connected, that is. I currently still have half a year's worth of subscription with another VPN service, but their speeds are so bad I couldn't take it anymore. I'm loving AirVPN, there's just one problem... it takes me forever to get connected! I'm on Windows and using the network lock beforehand, if that matters, but I was getting the same issue before I tried network lock so I think it's unrelated. Anyway, the AirVPN client gets stuck at "Connecting to ____" for a few minutes, before going crazy and dropping connection, then reconnecting, then dropping connection, etc. a few more times before finally establishing stable connection. I've done a little troubleshooting on my end, ensuring my Wi-Fi adapter is set to DHCP, as well as my TAP ethernet adapter (with the exception of DNS servers once connection is made). Any help would be greatly appreciated, because if I can solve this one little hiccup there will be nothing holding me back from continuing my subscription, even though I have half a year remaining with someone else. I've attached my logs below. Thanks!

 

I 2017.03.28 08:26:05 - Eddie client version: 2.12.4 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0, Mono/.Net Framework: v4.0.30319
. 2017.03.28 08:26:05 - Reading options from C:\Users\user\AppData\Local\AirVPN\AirVPN.xml
. 2017.03.28 08:26:05 - Data path: C:\Users\user\AppData\Local\AirVPN
. 2017.03.28 08:26:05 - Application path: C:\Program Files\AirVPN
. 2017.03.28 08:26:05 - Executable path: C:\Program Files\AirVPN\AirVPN.exe
. 2017.03.28 08:26:05 - Command line arguments (1): path="home"
. 2017.03.28 08:26:05 - Operating System: Microsoft Windows NT 10.0.14393.0
I 2017.03.28 08:26:06 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2017.03.28 08:26:06 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)
I 2017.03.28 08:26:06 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2017.03.28 08:26:06 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2017.03.28 08:26:06 - curl - Version: 7.34.0 (C:\Program Files\AirVPN\curl.exe)
I 2017.03.28 08:26:06 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
! 2017.03.28 08:26:07 - Ready
. 2017.03.28 08:26:07 - Updating systems & servers data ...
! 2017.03.28 08:26:29 - Activation of Network Lock - Windows Filtering Platform
I 2017.03.28 08:26:31 - Session starting.
. 2017.03.28 08:26:31 - IPv6 disabled with packet filtering.
I 2017.03.28 08:26:31 - Checking authorization ...
! 2017.03.28 08:26:31 - Connecting to Pollux (United States, Jacksonville, Florida)
. 2017.03.28 08:29:36 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2017.03.28 08:29:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.03.28 08:29:36 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2017.03.28 08:29:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.03.28 08:29:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.03.28 08:29:36 - OpenVPN > UDP link local: (not bound)
. 2017.03.28 08:29:36 - OpenVPN > UDP link remote: [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:36 - OpenVPN > TLS: Initial packet from [AF_INET]198.203.28.42:443, sid=6d3b5d39 17d46015
. 2017.03.28 08:29:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.03.28 08:29:36 - OpenVPN > Validating certificate key usage
. 2017.03.28 08:29:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.03.28 08:29:36 - OpenVPN > VERIFY KU OK
. 2017.03.28 08:29:36 - OpenVPN > Validating certificate extended key usage
. 2017.03.28 08:29:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.03.28 08:29:36 - OpenVPN > VERIFY EKU OK
. 2017.03.28 08:29:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.03.28 08:29:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.03.28 08:29:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.03.28 08:29:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.39 255.255.0.0'
. 2017.03.28 08:29:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.03.28 08:29:36 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.03.28 08:29:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.03.28 08:29:36 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.03.28 08:29:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.03.28 08:29:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.03.28 08:29:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.03.28 08:29:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.03.28 08:29:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:36 - OpenVPN > interactive service msg_channel=0
. 2017.03.28 08:29:36 - OpenVPN > ROUTE_GATEWAY 172.31.112.1/255.255.254.0 I=13 HWADDR=9c:b6:d0:d8:fa:d5
. 2017.03.28 08:29:36 - OpenVPN > ROUTE: bypass_host_route[0]=1.1.1.1
. 2017.03.28 08:29:36 - OpenVPN > open_tun
. 2017.03.28 08:29:36 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{546A61D8-6FB4-4F3D-974E-38BA941B1E43}.tap
. 2017.03.28 08:29:36 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.03.28 08:29:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.39/255.255.0.0 [sUCCEEDED]
. 2017.03.28 08:29:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.39/255.255.0.0 on interface {546A61D8-6FB4-4F3D-974E-38BA941B1E43} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.03.28 08:29:36 - OpenVPN > Successful ARP Flush on interface [9] {546A61D8-6FB4-4F3D-974E-38BA941B1E43}
. 2017.03.28 08:29:36 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.03.28 08:29:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.03.28 08:29:36 - OpenVPN > C:\windows\system32\route.exe ADD 198.203.28.42 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4
. 2017.03.28 08:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:36 - OpenVPN > C:\windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4
. 2017.03.28 08:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:36 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2017.03.28 08:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:36 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2017.03.28 08:29:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:36 - Starting Management Interface
. 2017.03.28 08:29:36 - OpenVPN > Initialization Sequence Completed
. 2017.03.28 08:29:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2017.03.28 08:29:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2017.03.28 08:29:36 - OpenVPN > Restart pause, 5 second(s)
. 2017.03.28 08:29:36 - DNS leak protection with packet filtering enabled.
! 2017.03.28 08:29:36 - Disconnecting
. 2017.03.28 08:29:36 - Management - Send 'signal SIGTERM'
. 2017.03.28 08:29:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.03.28 08:29:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2017.03.28 08:29:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 208.67.220.220,208.67.222.222)
. 2017.03.28 08:29:36 - Flushing DNS
. 2017.03.28 08:29:36 - Connection terminated.
. 2017.03.28 08:29:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2017.03.28 08:29:36 - DNS leak protection with packet filtering disabled.
I 2017.03.28 08:29:39 - Checking authorization ...
W 2017.03.28 08:29:40 - Waiting TUN interface
! 2017.03.28 08:29:40 - Connecting to Pollux (United States, Jacksonville, Florida)
. 2017.03.28 08:29:40 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2017.03.28 08:29:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.03.28 08:29:40 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2017.03.28 08:29:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.03.28 08:29:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.03.28 08:29:40 - OpenVPN > UDP link local: (not bound)
. 2017.03.28 08:29:40 - OpenVPN > UDP link remote: [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:40 - OpenVPN > TLS: Initial packet from [AF_INET]198.203.28.42:443, sid=b4b8391f 8172a842
. 2017.03.28 08:29:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.03.28 08:29:40 - OpenVPN > Validating certificate key usage
. 2017.03.28 08:29:40 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.03.28 08:29:40 - OpenVPN > VERIFY KU OK
. 2017.03.28 08:29:40 - OpenVPN > Validating certificate extended key usage
. 2017.03.28 08:29:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.03.28 08:29:40 - OpenVPN > VERIFY EKU OK
. 2017.03.28 08:29:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.03.28 08:29:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.03.28 08:29:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]198.203.28.42:443
W 2017.03.28 08:29:42 - Waiting TUN interface
. 2017.03.28 08:29:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.03.28 08:29:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.39 255.255.0.0'
. 2017.03.28 08:29:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.03.28 08:29:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.03.28 08:29:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.03.28 08:29:42 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.03.28 08:29:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.03.28 08:29:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.03.28 08:29:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.03.28 08:29:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.03.28 08:29:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:42 - OpenVPN > interactive service msg_channel=0
. 2017.03.28 08:29:42 - OpenVPN > ROUTE_GATEWAY 172.31.112.1/255.255.254.0 I=13 HWADDR=9c:b6:d0:d8:fa:d5
. 2017.03.28 08:29:42 - OpenVPN > ROUTE: bypass_host_route[0]=1.1.1.1
. 2017.03.28 08:29:42 - OpenVPN > open_tun
. 2017.03.28 08:29:42 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{546A61D8-6FB4-4F3D-974E-38BA941B1E43}.tap
. 2017.03.28 08:29:42 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.03.28 08:29:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.39/255.255.0.0 [sUCCEEDED]
. 2017.03.28 08:29:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.39/255.255.0.0 on interface {546A61D8-6FB4-4F3D-974E-38BA941B1E43} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.03.28 08:29:42 - OpenVPN > Successful ARP Flush on interface [9] {546A61D8-6FB4-4F3D-974E-38BA941B1E43}
. 2017.03.28 08:29:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
I 2017.03.28 08:29:44 - Checking route
E 2017.03.28 08:29:44 - Checking route don't match
. 2017.03.28 08:29:44 - Checking route (2° try)
E 2017.03.28 08:29:46 - Checking route don't match
. 2017.03.28 08:29:46 - Checking route (3° try)
. 2017.03.28 08:29:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.03.28 08:29:47 - OpenVPN > C:\windows\system32\route.exe ADD 198.203.28.42 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4
. 2017.03.28 08:29:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:47 - OpenVPN > C:\windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4
. 2017.03.28 08:29:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:47 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2017.03.28 08:29:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:47 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2017.03.28 08:29:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:47 - Starting Management Interface
. 2017.03.28 08:29:47 - OpenVPN > Initialization Sequence Completed
. 2017.03.28 08:29:47 - DNS leak protection with packet filtering enabled.
. 2017.03.28 08:29:47 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 208.67.220.220,208.67.222.222)
. 2017.03.28 08:29:47 - Flushing DNS
! 2017.03.28 08:29:49 - Connected.
. 2017.03.28 08:29:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.03.28 08:29:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.03.28 08:29:49 - OpenVPN > C:\windows\system32\route.exe DELETE 198.203.28.42 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:49 - OpenVPN > C:\windows\system32\route.exe DELETE 1.1.1.1 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.03.28 08:29:49 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:49 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:49 - OpenVPN > Closing TUN/TAP interface
. 2017.03.28 08:29:49 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
! 2017.03.28 08:29:49 - Disconnecting
. 2017.03.28 08:29:49 - Management - Send 'signal SIGTERM'
. 2017.03.28 08:29:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.03.28 08:29:50 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2017.03.28 08:29:50 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2017.03.28 08:29:54 - OpenVPN > C:\windows\system32\route.exe DELETE 198.203.28.42 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:54 - OpenVPN > C:\windows\system32\route.exe DELETE 1.1.1.1 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:29:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:54 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:54 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:29:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2017.03.28 08:29:54 - OpenVPN > Closing TUN/TAP interface
. 2017.03.28 08:29:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2017.03.28 08:29:54 - Connection terminated.
. 2017.03.28 08:29:54 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2017.03.28 08:29:54 - DNS leak protection with packet filtering disabled.
I 2017.03.28 08:29:57 - Checking authorization ...
! 2017.03.28 08:29:57 - Connecting to Pollux (United States, Jacksonville, Florida)
. 2017.03.28 08:29:57 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017
. 2017.03.28 08:29:57 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.03.28 08:29:57 - OpenVPN > library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.09
. 2017.03.28 08:29:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.03.28 08:29:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.03.28 08:29:57 - OpenVPN > UDP link local: (not bound)
. 2017.03.28 08:29:57 - OpenVPN > UDP link remote: [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:57 - OpenVPN > TLS: Initial packet from [AF_INET]198.203.28.42:443, sid=16fd2638 531cfc35
. 2017.03.28 08:29:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.03.28 08:29:57 - OpenVPN > Validating certificate key usage
. 2017.03.28 08:29:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2017.03.28 08:29:57 - OpenVPN > VERIFY KU OK
. 2017.03.28 08:29:57 - OpenVPN > Validating certificate extended key usage
. 2017.03.28 08:29:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.03.28 08:29:57 - OpenVPN > VERIFY EKU OK
. 2017.03.28 08:29:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.03.28 08:29:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.03.28 08:29:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]198.203.28.42:443
. 2017.03.28 08:29:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.03.28 08:29:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.39 255.255.0.0'
. 2017.03.28 08:29:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.03.28 08:29:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.03.28 08:29:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.03.28 08:29:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.03.28 08:29:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.03.28 08:29:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.03.28 08:29:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.03.28 08:29:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.03.28 08:29:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.03.28 08:29:59 - OpenVPN > interactive service msg_channel=0
. 2017.03.28 08:29:59 - OpenVPN > ROUTE_GATEWAY 172.31.112.1/255.255.254.0 I=13 HWADDR=9c:b6:d0:d8:fa:d5
. 2017.03.28 08:29:59 - OpenVPN > ROUTE: bypass_host_route[0]=1.1.1.1
. 2017.03.28 08:29:59 - OpenVPN > open_tun
. 2017.03.28 08:29:59 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{546A61D8-6FB4-4F3D-974E-38BA941B1E43}.tap
. 2017.03.28 08:29:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2017.03.28 08:29:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.48.39/255.255.0.0 [sUCCEEDED]
. 2017.03.28 08:29:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.48.39/255.255.0.0 on interface {546A61D8-6FB4-4F3D-974E-38BA941B1E43} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2017.03.28 08:29:59 - OpenVPN > Successful ARP Flush on interface [9] {546A61D8-6FB4-4F3D-974E-38BA941B1E43}
. 2017.03.28 08:29:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.03.28 08:30:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2017.03.28 08:30:04 - OpenVPN > C:\windows\system32\route.exe ADD 198.203.28.42 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4
. 2017.03.28 08:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:30:04 - OpenVPN > C:\windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 172.31.112.1
. 2017.03.28 08:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4
. 2017.03.28 08:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:30:04 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2017.03.28 08:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:30:04 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2017.03.28 08:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2017.03.28 08:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2017.03.28 08:30:04 - Starting Management Interface
. 2017.03.28 08:30:04 - OpenVPN > Initialization Sequence Completed
. 2017.03.28 08:30:04 - DNS leak protection with packet filtering enabled.
. 2017.03.28 08:30:04 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 208.67.220.220,208.67.222.222)
. 2017.03.28 08:30:04 - Flushing DNS
I 2017.03.28 08:30:07 - Checking route
! 2017.03.28 08:30:08 - Connected.
. 2017.03.28 08:30:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2017.03.28 08:30:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

Share this post


Link to post

Hello!

 

Welcome to AirVPN!

 

You could try to disable IPv6 on all adapters, including the TAP adapter .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post
Posted ... (edited)

Hello!

 

Welcome to AirVPN!

 

You could try to disable IPv6 on all adapters, including the TAP adapter .

 

Tried this, still same exact issue. No change.

 

EDIT: I added that server to the blacklist on a whim and that seemed to solve my issue. I'll give it a day just to be sure.

Edited ... by mwillis

Share this post


Link to post

windows = suffering

strange how many new computer companies (HP) are creating computers with chipsets that do not have drivers with linux support. It is almost like there is a conspiracy to make computers that can not be used with linux. Get an old one (computer) and be safer

Share this post


Link to post

windows = suffering

strange how many new computer companies (HP) are creating computers with chipsets that do not have drivers with linux support. It is almost like there is a conspiracy to make computers that can not be used with linux. Get an old one (computer) and be safer

 

I dual boot Linux with this same machine though, Fedora runs very stable on it so I'm not sure if it's a hardware issue. I mentioned in my last post how changing servers helped, and it did temporarily... this morning when I tried to connect I'm still getting the same issue with similar logs.

Share this post


Link to post

 

Preferences -> OVPN directives -> under Custom directives, add command:
 
ip-win32 netsh
 
Save and reconnect. 

 

Wow... I think that may have fixed it! I'll give it another day just to be sure, as last time I thought the problem was solved it came back the next day. Thanks for the help!

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...