ForgottenSkynet 0 Posted ... The connection is constantly dropping out for me, and it's really annoying. Am I the only one? This is over an hour period. Green is download, as shown by the 3 sections of radio silence. The drops are typically 20-40 seconds. This has been happening for a few weeks now. Log. 2017.04.03 14:34:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.03 14:34:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.03 14:34:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.03 14:34:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:09 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.03 14:34:09 - OpenVPN > UDPv4 link local: [undef]. 2017.04.03 14:34:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443. 2017.04.03 14:34:12 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=7d38e23d 4c09a0c0. 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 14:34:12 - OpenVPN > Validating certificate key usage. 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 14:34:12 - OpenVPN > VERIFY KU OK. 2017.04.03 14:34:12 - OpenVPN > Validating certificate extended key usage. 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 14:34:12 - OpenVPN > VERIFY EKU OK. 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 14:34:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443. 2017.04.03 14:34:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.03 14:34:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0'. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.03 14:34:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.03 14:34:17 - OpenVPN > Opened utun device utun0. 2017.04.03 14:34:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.03 14:34:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0. 2017.04.03 14:34:17 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255. 2017.04.03 14:34:17 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.03 14:34:17 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.03 14:34:17 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.03 14:34:17 - Starting Management Interface. 2017.04.03 14:34:17 - OpenVPN > Initialization Sequence CompletedI 2017.04.03 14:34:17 - DNS of a network adapter forced (Ethernet)I 2017.04.03 14:34:17 - DNS of a network adapter forced (Wi-Fi)I 2017.04.03 14:34:17 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.03 14:34:17 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.03 14:34:17 - Flushing DNS. 2017.04.03 14:34:18 - OS X - PF rules updated, reloadingI 2017.04.03 14:34:18 - Checking routeI 2017.04.03 14:34:19 - Checking DNS! 2017.04.03 14:34:19 - Connected.. 2017.04.03 14:34:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.03 14:34:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.03 14:36:43 - Updating systems & servers data .... 2017.04.03 14:36:44 - Systems & servers data update completed. 2017.04.03 15:07:38 - Updating systems & servers data .... 2017.04.03 15:07:39 - Systems & servers data update completed. 2017.04.03 15:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=114372764/0 pkts=286783/0. 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 15:34:15 - OpenVPN > Validating certificate key usage. 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 15:34:15 - OpenVPN > VERIFY KU OK. 2017.04.03 15:34:15 - OpenVPN > Validating certificate extended key usage. 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 15:34:15 - OpenVPN > VERIFY EKU OK. 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 15:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 15:37:52 - Updating systems & servers data .... 2017.04.03 15:37:52 - Systems & servers data update completed. 2017.04.03 16:08:06 - Updating systems & servers data .... 2017.04.03 16:08:25 - Systems & servers data update completed. 2017.04.03 16:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=55751057/0 pkts=312959/0. 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 16:34:15 - OpenVPN > Validating certificate key usage. 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 16:34:15 - OpenVPN > VERIFY KU OK. 2017.04.03 16:34:15 - OpenVPN > Validating certificate extended key usage. 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 16:34:15 - OpenVPN > VERIFY EKU OK. 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 16:34:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 16:38:16 - Updating systems & servers data .... 2017.04.03 16:38:16 - Systems & servers data update completed. 2017.04.03 17:09:12 - Updating systems & servers data .... 2017.04.03 17:09:12 - OS X - PF rules updated, reloading. 2017.04.03 17:09:13 - Systems & servers data update completedI 2017.04.03 17:34:15 - Renewing TLS key. 2017.04.03 17:34:15 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 17:34:17 - OpenVPN > TLS: soft reset sec=0 bytes=15102625/0 pkts=42253/0. 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 17:34:17 - OpenVPN > Validating certificate key usage. 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 17:34:17 - OpenVPN > VERIFY KU OK. 2017.04.03 17:34:17 - OpenVPN > Validating certificate extended key usage. 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 17:34:17 - OpenVPN > VERIFY EKU OK. 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 17:34:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 17:40:08 - Updating systems & servers data .... 2017.04.03 17:40:09 - Systems & servers data update completed. 2017.04.03 18:11:04 - Updating systems & servers data .... 2017.04.03 18:11:06 - Systems & servers data update completedI 2017.04.03 18:34:17 - Renewing TLS key. 2017.04.03 18:34:17 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 18:34:19 - OpenVPN > TLS: soft reset sec=0 bytes=13987374/0 pkts=40248/0. 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 18:34:19 - OpenVPN > Validating certificate key usage. 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 18:34:19 - OpenVPN > VERIFY KU OK. 2017.04.03 18:34:19 - OpenVPN > Validating certificate extended key usage. 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 18:34:19 - OpenVPN > VERIFY EKU OK. 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 18:34:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 18:42:02 - Updating systems & servers data .... 2017.04.03 18:42:02 - Systems & servers data update completed. 2017.04.03 19:13:01 - Updating systems & servers data .... 2017.04.03 19:13:03 - Systems & servers data update completedI 2017.04.03 19:34:19 - Renewing TLS key. 2017.04.03 19:34:19 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 19:34:27 - OpenVPN > TLS: soft reset sec=0 bytes=43321137/0 pkts=83190/0. 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 19:34:27 - OpenVPN > Validating certificate key usage. 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 19:34:27 - OpenVPN > VERIFY KU OK. 2017.04.03 19:34:27 - OpenVPN > Validating certificate extended key usage. 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 19:34:27 - OpenVPN > VERIFY EKU OK. 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 19:34:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 19:43:09 - Updating systems & servers data .... 2017.04.03 19:43:10 - Systems & servers data update completed. 2017.04.03 20:14:08 - Updating systems & servers data .... 2017.04.03 20:14:08 - Systems & servers data update completedI 2017.04.03 20:34:27 - Renewing TLS key. 2017.04.03 20:34:27 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 20:34:35 - OpenVPN > TLS: soft reset sec=0 bytes=406592114/0 pkts=529431/0. 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 20:34:35 - OpenVPN > Validating certificate key usage. 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 20:34:35 - OpenVPN > VERIFY KU OK. 2017.04.03 20:34:35 - OpenVPN > Validating certificate extended key usage. 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 20:34:35 - OpenVPN > VERIFY EKU OK. 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 20:34:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 20:45:04 - Updating systems & servers data .... 2017.04.03 20:45:06 - Systems & servers data update completed. 2017.04.03 21:15:56 - Updating systems & servers data .... 2017.04.03 21:15:57 - Systems & servers data update completedI 2017.04.03 21:34:35 - Renewing TLS key. 2017.04.03 21:34:35 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 21:34:36 - OpenVPN > TLS: soft reset sec=0 bytes=74188922/0 pkts=107635/0. 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 21:34:36 - OpenVPN > Validating certificate key usage. 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 21:34:36 - OpenVPN > VERIFY KU OK. 2017.04.03 21:34:36 - OpenVPN > Validating certificate extended key usage. 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 21:34:36 - OpenVPN > VERIFY EKU OK. 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 21:34:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 21:46:47 - Updating systems & servers data .... 2017.04.03 21:46:48 - Systems & servers data update completed. 2017.04.03 22:17:41 - Updating systems & servers data .... 2017.04.03 22:17:43 - Systems & servers data update completedI 2017.04.03 22:34:36 - Renewing TLS key. 2017.04.03 22:34:36 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 22:34:44 - OpenVPN > TLS: soft reset sec=0 bytes=155541345/0 pkts=191560/0. 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 22:34:44 - OpenVPN > Validating certificate key usage. 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 22:34:44 - OpenVPN > VERIFY KU OK. 2017.04.03 22:34:44 - OpenVPN > Validating certificate extended key usage. 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 22:34:44 - OpenVPN > VERIFY EKU OK. 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 22:34:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 22:48:38 - Updating systems & servers data .... 2017.04.03 22:48:39 - Systems & servers data update completed. 2017.04.03 23:19:34 - Updating systems & servers data .... 2017.04.03 23:19:36 - Systems & servers data update completedI 2017.04.03 23:34:44 - Renewing TLS key. 2017.04.03 23:34:44 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 23:34:50 - OpenVPN > TLS: soft reset sec=0 bytes=543820781/0 pkts=624008/0. 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 23:34:50 - OpenVPN > Validating certificate key usage. 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 23:34:50 - OpenVPN > VERIFY KU OK. 2017.04.03 23:34:50 - OpenVPN > Validating certificate extended key usage. 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 23:34:50 - OpenVPN > VERIFY EKU OK. 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 23:34:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 23:50:31 - Updating systems & servers data .... 2017.04.03 23:50:32 - Systems & servers data update completed. 2017.04.04 00:21:28 - Updating systems & servers data .... 2017.04.04 00:21:36 - Systems & servers data update completedI 2017.04.04 00:34:50 - Renewing TLS key. 2017.04.04 00:34:50 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 00:34:51 - OpenVPN > TLS: soft reset sec=0 bytes=298572455/0 pkts=329031/0. 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 00:34:51 - OpenVPN > Validating certificate key usage. 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 00:34:51 - OpenVPN > VERIFY KU OK. 2017.04.04 00:34:51 - OpenVPN > Validating certificate extended key usage. 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 00:34:51 - OpenVPN > VERIFY EKU OK. 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 00:34:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 00:51:34 - Updating systems & servers data .... 2017.04.04 00:51:35 - Systems & servers data update completed. 2017.04.04 01:22:29 - Updating systems & servers data .... 2017.04.04 01:22:31 - Systems & servers data update completedI 2017.04.04 01:34:51 - Renewing TLS key. 2017.04.04 01:34:51 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 01:34:54 - OpenVPN > TLS: soft reset sec=0 bytes=304191023/0 pkts=343770/0. 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 01:34:54 - OpenVPN > Validating certificate key usage. 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 01:34:54 - OpenVPN > VERIFY KU OK. 2017.04.04 01:34:54 - OpenVPN > Validating certificate extended key usage. 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 01:34:54 - OpenVPN > VERIFY EKU OK. 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 01:35:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 01:53:27 - Updating systems & servers data .... 2017.04.04 01:53:28 - Systems & servers data update completed. 2017.04.04 02:23:35 - Updating systems & servers data .... 2017.04.04 02:23:37 - Systems & servers data update completedI 2017.04.04 02:34:54 - Renewing TLS key. 2017.04.04 02:34:54 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 02:35:00 - OpenVPN > Validating certificate key usage. 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 02:35:00 - OpenVPN > VERIFY KU OK. 2017.04.04 02:35:00 - OpenVPN > Validating certificate extended key usage. 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 02:35:00 - OpenVPN > VERIFY EKU OK. 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 02:35:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 02:46:45 - OS X - PF rules updated, reloading! 2017.04.04 02:46:45 - Disconnecting. 2017.04.04 02:46:45 - Management - Send 'signal SIGTERM'. 2017.04.04 02:46:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 02:46:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 213.152.162.98 192.168.0.1 255.255.255.255. 2017.04.04 02:46:50 - OpenVPN > delete net 213.152.162.98: gateway 192.168.0.1. 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 02:46:50 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 02:46:50 - Connection terminated.I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Ethernet). 2017.04.04 02:46:50 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 02:46:50 - OpenVPN > Closing TUN/TAP interface. 2017.04.04 02:46:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Ethernet)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Wi-Fi)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Bluetooth PAN)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2017.04.04 02:46:50 - Session terminated.. 2017.04.04 02:53:41 - Updating systems & servers data .... 2017.04.04 02:53:41 - Systems & servers data update completed. 2017.04.04 03:24:35 - Updating systems & servers data .... 2017.04.04 03:24:36 - Systems & servers data update completed. 2017.04.04 03:55:30 - Updating systems & servers data .... 2017.04.04 03:55:30 - Systems & servers data update completed. 2017.04.04 04:26:24 - Updating systems & servers data .... 2017.04.04 04:26:25 - Systems & servers data update completed. 2017.04.04 04:57:19 - Updating systems & servers data .... 2017.04.04 04:57:20 - Systems & servers data update completed. 2017.04.04 05:28:14 - Updating systems & servers data .... 2017.04.04 05:28:14 - Systems & servers data update completed. 2017.04.04 05:59:09 - Updating systems & servers data .... 2017.04.04 05:59:09 - Systems & servers data update completed. 2017.04.04 06:30:03 - Updating systems & servers data .... 2017.04.04 06:30:04 - Systems & servers data update completed. 2017.04.04 07:00:58 - Updating systems & servers data .... 2017.04.04 07:00:59 - Systems & servers data update completed. 2017.04.04 07:31:53 - Updating systems & servers data .... 2017.04.04 07:31:53 - Systems & servers data update completed. 2017.04.04 08:02:48 - Updating systems & servers data .... 2017.04.04 08:02:48 - Systems & servers data update completed. 2017.04.04 08:33:42 - Updating systems & servers data .... 2017.04.04 08:33:42 - Systems & servers data update completed. 2017.04.04 09:04:36 - Updating systems & servers data .... 2017.04.04 09:04:37 - Systems & servers data update completed. 2017.04.04 09:35:31 - Updating systems & servers data .... 2017.04.04 09:35:32 - Systems & servers data update completed. 2017.04.04 10:06:26 - Updating systems & servers data .... 2017.04.04 10:06:26 - Systems & servers data update completed. 2017.04.04 10:37:21 - Updating systems & servers data .... 2017.04.04 10:37:21 - Systems & servers data update completed. 2017.04.04 11:08:16 - Updating systems & servers data .... 2017.04.04 11:08:16 - Systems & servers data update completed. 2017.04.04 11:39:11 - Updating systems & servers data .... 2017.04.04 11:39:11 - Systems & servers data update completed. 2017.04.04 12:10:05 - Updating systems & servers data .... 2017.04.04 12:10:06 - Systems & servers data update completed. 2017.04.04 12:41:00 - Updating systems & servers data .... 2017.04.04 12:41:01 - Systems & servers data update completedI 2017.04.04 12:43:48 - Session starting.I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Ethernet)I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Wi-Fi)I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Bluetooth PAN)I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2017.04.04 12:43:48 - Checking authorization ...! 2017.04.04 12:43:49 - Connecting to Gienah (Netherlands, Alblasserdam). 2017.04.04 12:43:49 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 12:43:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 12:43:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 12:43:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 12:43:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:49 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 12:43:49 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 12:43:49 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443. 2017.04.04 12:43:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=0359c113 770eb6f0. 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 12:43:49 - OpenVPN > Validating certificate key usage. 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 12:43:49 - OpenVPN > VERIFY KU OK. 2017.04.04 12:43:49 - OpenVPN > Validating certificate extended key usage. 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 12:43:49 - OpenVPN > VERIFY EKU OK. 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 12:43:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443. 2017.04.04 12:43:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 12:43:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.97 255.255.0.0'. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 12:43:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 12:43:53 - OpenVPN > route: writing to routing socket: File exists. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 12:43:53 - OpenVPN > Opened utun device utun0. 2017.04.04 12:43:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 12:43:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 10.4.70.97 10.4.70.97 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.70.97 255.255.0.0. 2017.04.04 12:43:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.70.97. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 213.152.162.93 192.168.0.1 255.255.255.255. 2017.04.04 12:43:53 - OpenVPN > add net 213.152.162.93: gateway 192.168.0.1: File exists. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 12:43:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 12:43:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 12:43:53 - Starting Management Interface. 2017.04.04 12:43:53 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 12:43:53 - DNS of a network adapter forced (Ethernet)I 2017.04.04 12:43:53 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 12:43:53 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 12:43:53 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 12:43:53 - Flushing DNS. 2017.04.04 12:43:53 - OS X - PF rules updated, reloadingI 2017.04.04 12:43:53 - Checking routeI 2017.04.04 12:43:54 - Checking DNS! 2017.04.04 12:43:54 - Connected.. 2017.04.04 12:43:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 12:43:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 13:11:57 - Updating systems & servers data .... 2017.04.04 13:12:00 - Systems & servers data update completed. 2017.04.04 13:42:58 - Updating systems & servers data .... 2017.04.04 13:42:59 - Systems & servers data update completed. 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 13:43:50 - OpenVPN > Validating certificate key usage. 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 13:43:50 - OpenVPN > VERIFY KU OK. 2017.04.04 13:43:50 - OpenVPN > Validating certificate extended key usage. 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 13:43:50 - OpenVPN > VERIFY EKU OK. 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 13:43:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 14:12:59 - Updating systems & servers data .... 2017.04.04 14:12:59 - Systems & servers data update completed. 2017.04.04 14:43:01 - Updating systems & servers data .... 2017.04.04 14:43:02 - Systems & servers data update completedI 2017.04.04 14:43:50 - Renewing TLS key. 2017.04.04 14:43:50 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 14:43:53 - OpenVPN > TLS: soft reset sec=0 bytes=13993207/0 pkts=33370/0. 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 14:43:54 - OpenVPN > Validating certificate key usage. 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 14:43:54 - OpenVPN > VERIFY KU OK. 2017.04.04 14:43:54 - OpenVPN > Validating certificate extended key usage. 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 14:43:54 - OpenVPN > VERIFY EKU OK. 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 14:43:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 15:14:03 - Updating systems & servers data .... 2017.04.04 15:14:03 - Systems & servers data update completed. 2017.04.04 15:31:13 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.04 15:31:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 15:31:13 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 15:31:13 - OS X - PF rules updated, reloading! 2017.04.04 15:31:13 - Disconnecting. 2017.04.04 15:31:13 - Management - Send 'signal SIGTERM'. 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 15:31:13 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 15:31:13 - OpenVPN > Exiting due to fatal error. 2017.04.04 15:31:14 - Connection terminated.I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 15:31:26 - Checking authorization ...! 2017.04.04 15:31:26 - Connecting to Subra (Netherlands, Alblasserdam). 2017.04.04 15:31:26 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 15:31:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 15:31:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 15:31:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 15:31:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:26 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 15:31:26 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 15:31:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443. 2017.04.04 15:31:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=82cabec5 26b9b800. 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 15:31:30 - OpenVPN > Validating certificate key usage. 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 15:31:30 - OpenVPN > VERIFY KU OK. 2017.04.04 15:31:30 - OpenVPN > Validating certificate extended key usage. 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 15:31:30 - OpenVPN > VERIFY EKU OK. 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 15:31:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443. 2017.04.04 15:31:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 15:31:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0'. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 15:31:36 - OpenVPN > Opened utun device utun0. 2017.04.04 15:31:36 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 15:31:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 15:31:36 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0. 2017.04.04 15:31:36 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255. 2017.04.04 15:31:36 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 15:31:36 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 15:31:36 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 15:31:36 - Starting Management Interface. 2017.04.04 15:31:36 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 15:31:36 - DNS of a network adapter forced (Ethernet)I 2017.04.04 15:31:36 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 15:31:36 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 15:31:36 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 15:31:36 - Flushing DNS. 2017.04.04 15:31:36 - OS X - PF rules updated, reloadingI 2017.04.04 15:31:36 - Checking routeI 2017.04.04 15:31:37 - Checking DNS! 2017.04.04 15:31:37 - Connected.. 2017.04.04 15:31:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 15:31:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 15:44:59 - Updating systems & servers data .... 2017.04.04 15:45:00 - Systems & servers data update completed. 2017.04.04 16:15:55 - Updating systems & servers data .... 2017.04.04 16:15:57 - Systems & servers data update completed. 2017.04.04 16:31:33 - OpenVPN > TLS: soft reset sec=0 bytes=5887067/0 pkts=22098/0. 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 16:31:33 - OpenVPN > Validating certificate key usage. 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 16:31:33 - OpenVPN > VERIFY KU OK. 2017.04.04 16:31:33 - OpenVPN > Validating certificate extended key usage. 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 16:31:33 - OpenVPN > VERIFY EKU OK. 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity). 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS handshake failed. 2017.04.04 16:32:33 - OpenVPN > TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1. 2017.04.04 16:32:34 - OpenVPN > [uNDEF] Inactivity timeout (--ping-restart), restarting. 2017.04.04 16:32:34 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 16:32:34 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 16:32:34 - OS X - PF rules updated, reloading! 2017.04.04 16:32:34 - Disconnecting. 2017.04.04 16:32:34 - Management - Send 'signal SIGTERM'. 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 16:32:34 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 16:32:34 - OpenVPN > Exiting due to fatal error. 2017.04.04 16:32:34 - Connection terminated.I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 16:32:48 - Checking authorization ...! 2017.04.04 16:32:48 - Connecting to Ancha (Netherlands, Alblasserdam). 2017.04.04 16:32:48 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 16:32:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 16:32:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 16:32:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 16:32:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:48 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 16:32:48 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 16:32:48 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.164:443. 2017.04.04 16:32:48 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=a3668ad5 f28645b8. 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 16:32:48 - OpenVPN > Validating certificate key usage. 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 16:32:48 - OpenVPN > VERIFY KU OK. 2017.04.04 16:32:48 - OpenVPN > Validating certificate extended key usage. 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 16:32:48 - OpenVPN > VERIFY EKU OK. 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 16:32:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443. 2017.04.04 16:33:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 16:33:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.53.187 255.255.0.0'. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 16:33:01 - OpenVPN > Opened utun device utun0. 2017.04.04 16:33:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 16:33:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 16:33:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 10.4.53.187 10.4.53.187 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.53.187 255.255.0.0. 2017.04.04 16:33:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.53.187. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 213.152.162.164 192.168.0.1 255.255.255.255. 2017.04.04 16:33:01 - OpenVPN > add net 213.152.162.164: gateway 192.168.0.1. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 16:33:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 16:33:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 16:33:01 - Starting Management Interface. 2017.04.04 16:33:01 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 16:33:01 - DNS of a network adapter forced (Ethernet)I 2017.04.04 16:33:01 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 16:33:01 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 16:33:01 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 16:33:01 - Flushing DNS. 2017.04.04 16:33:01 - OS X - PF rules updated, reloadingI 2017.04.04 16:33:01 - Checking routeI 2017.04.04 16:33:02 - Checking DNS! 2017.04.04 16:33:02 - Connected.. 2017.04.04 16:33:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 16:33:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 16:46:54 - Updating systems & servers data .... 2017.04.04 16:46:55 - Systems & servers data update completed. 2017.04.04 17:17:51 - Updating systems & servers data .... 2017.04.04 17:17:52 - Systems & servers data update completed. 2017.04.04 17:32:59 - OpenVPN > TLS: soft reset sec=0 bytes=32789571/0 pkts=61252/0. 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 17:33:02 - OpenVPN > Validating certificate key usage. 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 17:33:02 - OpenVPN > VERIFY KU OK. 2017.04.04 17:33:02 - OpenVPN > Validating certificate extended key usage. 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 17:33:02 - OpenVPN > VERIFY EKU OK. 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:33:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 17:36:59 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.04 17:36:59 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 17:36:59 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 17:36:59 - OS X - PF rules updated, reloading! 2017.04.04 17:36:59 - Disconnecting. 2017.04.04 17:36:59 - Management - Send 'signal SIGTERM'. 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 17:36:59 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 17:36:59 - OpenVPN > Exiting due to fatal error. 2017.04.04 17:37:00 - Connection terminated.I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 17:37:14 - Checking authorization ...! 2017.04.04 17:37:14 - Connecting to Alterf (Netherlands, Alblasserdam). 2017.04.04 17:37:14 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 17:37:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 17:37:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 17:37:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 17:37:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:14 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 17:37:14 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 17:37:14 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.169:443. 2017.04.04 17:37:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.169:443, sid=ae5243c6 b8e4d400. 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 17:37:14 - OpenVPN > Validating certificate key usage. 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 17:37:14 - OpenVPN > VERIFY KU OK. 2017.04.04 17:37:14 - OpenVPN > Validating certificate extended key usage. 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 17:37:14 - OpenVPN > VERIFY EKU OK. 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 17:37:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.169:443. 2017.04.04 17:37:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 17:37:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.250 255.255.0.0'. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 17:37:23 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 17:37:23 - OpenVPN > Opened utun device utun0. 2017.04.04 17:37:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 17:37:23 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 10.4.68.250 10.4.68.250 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.250 255.255.0.0. 2017.04.04 17:37:23 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.250. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 213.152.161.169 192.168.0.1 255.255.255.255. 2017.04.04 17:37:23 - OpenVPN > add net 213.152.161.169: gateway 192.168.0.1. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 17:37:23 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 17:37:23 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 17:37:23 - Starting Management Interface. 2017.04.04 17:37:23 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 17:37:23 - DNS of a network adapter forced (Ethernet)I 2017.04.04 17:37:23 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 17:37:23 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 17:37:23 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 17:37:23 - Flushing DNS. 2017.04.04 17:37:23 - OS X - PF rules updated, reloadingI 2017.04.04 17:37:23 - Checking routeI 2017.04.04 17:37:24 - Checking DNS! 2017.04.04 17:37:24 - Connected.. 2017.04.04 17:37:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 17:37:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 17:48:45 - Updating systems & servers data .... 2017.04.04 17:48:46 - Systems & servers data update completed. 2017.04.04 18:19:37 - Updating systems & servers data .... 2017.04.04 18:19:38 - Systems & servers data update completed. 2017.04.04 18:37:20 - OpenVPN > TLS: soft reset sec=0 bytes=49281504/0 pkts=75148/0. 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 18:37:20 - OpenVPN > Validating certificate key usage. 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 18:37:20 - OpenVPN > VERIFY KU OK. 2017.04.04 18:37:20 - OpenVPN > Validating certificate extended key usage. 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 18:37:20 - OpenVPN > VERIFY EKU OK. 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 18:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 18:50:29 - Updating systems & servers data .... 2017.04.04 18:50:31 - Systems & servers data update completed. 2017.04.04 19:21:22 - Updating systems & servers data .... 2017.04.04 19:21:24 - Systems & servers data update completedI 2017.04.04 19:37:20 - Renewing TLS key. 2017.04.04 19:37:20 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 19:37:26 - OpenVPN > Validating certificate key usage. 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 19:37:26 - OpenVPN > VERIFY KU OK. 2017.04.04 19:37:26 - OpenVPN > Validating certificate extended key usage. 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 19:37:26 - OpenVPN > VERIFY EKU OK. 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 19:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 19:52:15 - Updating systems & servers data .... 2017.04.04 19:52:17 - Systems & servers data update completed. 2017.04.04 20:23:08 - Updating systems & servers data .... 2017.04.04 20:23:09 - Systems & servers data update completed. 2017.04.04 20:37:26 - OpenVPN > TLS: soft reset sec=0 bytes=5063308/0 pkts=20058/0. 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 20:37:26 - OpenVPN > Validating certificate key usage. 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 20:37:26 - OpenVPN > VERIFY KU OK. 2017.04.04 20:37:26 - OpenVPN > Validating certificate extended key usage. 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 20:37:26 - OpenVPN > VERIFY EKU OK. 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 20:37:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 20:54:01 - Updating systems & servers data .... 2017.04.04 20:54:02 - Systems & servers data update completed. 2017.04.04 21:25:02 - Updating systems & servers data .... 2017.04.04 21:25:02 - Systems & servers data update completedI 2017.04.04 21:37:26 - Renewing TLS key. 2017.04.04 21:37:26 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 21:37:32 - OpenVPN > TLS: soft reset sec=0 bytes=6429402/0 pkts=22343/0. 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 21:37:32 - OpenVPN > Validating certificate key usage. 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 21:37:32 - OpenVPN > VERIFY KU OK. 2017.04.04 21:37:32 - OpenVPN > Validating certificate extended key usage. 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 21:37:32 - OpenVPN > VERIFY EKU OK. 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 21:37:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 21:55:10 - Updating systems & servers data .... 2017.04.04 21:55:11 - Systems & servers data update completed. 2017.04.04 22:25:19 - Updating systems & servers data .... 2017.04.04 22:25:20 - Systems & servers data update completedI 2017.04.04 22:37:32 - Renewing TLS key. 2017.04.04 22:37:32 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 22:37:41 - OpenVPN > TLS: soft reset sec=0 bytes=5115062/0 pkts=20304/0. 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 22:37:41 - OpenVPN > Validating certificate key usage. 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 22:37:41 - OpenVPN > VERIFY KU OK. 2017.04.04 22:37:41 - OpenVPN > Validating certificate extended key usage. 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 22:37:41 - OpenVPN > VERIFY EKU OK. 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 22:37:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 22:55:27 - Updating systems & servers data .... 2017.04.04 22:55:29 - Systems & servers data update completed. 2017.04.04 23:26:24 - Updating systems & servers data .... 2017.04.04 23:26:25 - Systems & servers data update completed. 2017.04.04 23:27:41 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.04 23:27:41 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 23:27:41 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 23:27:41 - OS X - PF rules updated, reloading! 2017.04.04 23:27:41 - Disconnecting. 2017.04.04 23:27:41 - Management - Send 'signal SIGTERM'. 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 23:27:41 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 23:27:41 - OpenVPN > Exiting due to fatal error. 2017.04.04 23:27:41 - Connection terminated.I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 23:27:56 - Checking authorization ...! 2017.04.04 23:27:56 - Connecting to Alshat (Netherlands, Alblasserdam). 2017.04.04 23:27:56 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 23:27:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 23:27:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 23:27:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 23:27:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:56 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 23:27:56 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 23:27:56 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.4:443. 2017.04.04 23:27:56 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.4:443, sid=8afefa6f fea117d7. 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 23:27:58 - OpenVPN > Validating certificate key usage. 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 23:27:58 - OpenVPN > VERIFY KU OK. 2017.04.04 23:27:58 - OpenVPN > Validating certificate extended key usage. 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 23:27:58 - OpenVPN > VERIFY EKU OK. 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 23:27:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.4:443. 2017.04.04 23:28:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 23:28:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.151 255.255.0.0'. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 23:28:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 23:28:01 - OpenVPN > Opened utun device utun0. 2017.04.04 23:28:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 23:28:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 10.4.68.151 10.4.68.151 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.151 255.255.0.0. 2017.04.04 23:28:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.151. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 213.152.161.4 192.168.0.1 255.255.255.255. 2017.04.04 23:28:01 - OpenVPN > add net 213.152.161.4: gateway 192.168.0.1. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 23:28:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 23:28:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 23:28:01 - Starting Management Interface. 2017.04.04 23:28:01 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 23:28:01 - DNS of a network adapter forced (Ethernet)I 2017.04.04 23:28:01 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 23:28:01 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 23:28:01 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 23:28:01 - Flushing DNS. 2017.04.04 23:28:01 - OS X - PF rules updated, reloadingI 2017.04.04 23:28:01 - Checking routeI 2017.04.04 23:28:04 - Checking DNS! 2017.04.04 23:28:04 - Connected.. 2017.04.04 23:28:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 23:28:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 23:57:26 - Updating systems & servers data .... 2017.04.04 23:57:26 - Systems & servers data update completed. 2017.04.05 00:27:29 - Updating systems & servers data .... 2017.04.05 00:27:29 - Systems & servers data update completed. 2017.04.05 00:27:58 - OpenVPN > TLS: soft reset sec=0 bytes=91294170/0 pkts=283038/0. 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.05 00:27:58 - OpenVPN > Validating certificate key usage. 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.05 00:27:58 - OpenVPN > VERIFY KU OK. 2017.04.05 00:27:58 - OpenVPN > Validating certificate extended key usage. 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.05 00:27:58 - OpenVPN > VERIFY EKU OK. 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.05 00:43:17 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.05 00:43:17 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.05 00:43:17 - OpenVPN > Restart pause, 2 second(s). 2017.04.05 00:43:17 - OS X - PF rules updated, reloading! 2017.04.05 00:43:17 - Disconnecting. 2017.04.05 00:43:17 - Management - Send 'signal SIGTERM'. 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.05 00:43:17 - OpenVPN > Assertion failed at misc.c:779. 2017.04.05 00:43:17 - OpenVPN > Exiting due to fatal error. 2017.04.05 00:43:17 - Connection terminated.I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.05 00:43:27 - Checking authorization ...! 2017.04.05 00:43:28 - Connecting to Hydrus (Netherlands, Alblasserdam). 2017.04.05 00:43:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.05 00:43:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.05 00:43:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.05 00:43:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.05 00:43:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:28 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.05 00:43:28 - OpenVPN > UDPv4 link local: [undef]. 2017.04.05 00:43:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.9:443. 2017.04.05 00:43:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.9:443, sid=a3a5b645 7b31f16d. 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.05 00:43:39 - OpenVPN > Validating certificate key usage. 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.05 00:43:39 - OpenVPN > VERIFY KU OK. 2017.04.05 00:43:39 - OpenVPN > Validating certificate extended key usage. 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.05 00:43:39 - OpenVPN > VERIFY EKU OK. 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hydrus, emailAddress=info@airvpn.org. 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.05 00:43:39 - OpenVPN > [Hydrus] Peer Connection Initiated with [AF_INET]213.152.162.9:443. 2017.04.05 00:43:41 - OpenVPN > SENT CONTROL [Hydrus]: 'PUSH_REQUEST' (status=1). 2017.04.05 00:43:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.186 255.255.0.0,peer-id 4'. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.05 00:43:41 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.05 00:43:41 - OpenVPN > route: writing to routing socket: File exists. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561. 2017.04.05 00:43:42 - OpenVPN > Opened utun device utun0. 2017.04.05 00:43:42 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.05 00:43:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 10.4.5.186 10.4.5.186 netmask 255.255.0.0 mtu 1500 up. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.186 255.255.0.0. 2017.04.05 00:43:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.186. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 213.152.162.9 192.168.0.1 255.255.255.255. 2017.04.05 00:43:42 - OpenVPN > add net 213.152.162.9: gateway 192.168.0.1: File exists. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.05 00:43:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.05 00:43:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.05 00:43:42 - Starting Management Interface. 2017.04.05 00:43:42 - OpenVPN > Initialization Sequence CompletedI 2017.04.05 00:43:42 - DNS of a network adapter forced (Ethernet)I 2017.04.05 00:43:42 - DNS of a network adapter forced (Wi-Fi)I 2017.04.05 00:43:42 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.05 00:43:42 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.05 00:43:42 - Flushing DNS. 2017.04.05 00:43:42 - OS X - PF rules updated, reloadingI 2017.04.05 00:43:42 - Checking routeI 2017.04.05 00:43:46 - Checking DNS! 2017.04.05 00:43:46 - Connected.. 2017.04.05 00:43:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.05 00:43:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.05 00:58:22 - Updating systems & servers data ... . 2017.04.05 00:58:25 - Systems & servers data update completed Quote Share this post Link to post
nick75 25 Posted ... Hi, Your post couldn't be vaguer!signal drop? 3G/4G/Wi-Fi?Operating system?Logs?What is this graph? p2p, speed test, youtube? Quote Share this post Link to post
ForgottenSkynet 0 Posted ... signal drop? 3G/4G/Wi-Fi?This is over wifi, it says "OS X" in the logs. Operating system?It's in the log! Mac OS X El Capitan Logs?Can you not see the log in my original post? I added it with an edit like 2 minutes after posting it.Log. 2017.04.03 14:34:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.03 14:34:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.03 14:34:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.03 14:34:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:09 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.03 14:34:09 - OpenVPN > UDPv4 link local: [undef]. 2017.04.03 14:34:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443. 2017.04.03 14:34:12 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=7d38e23d 4c09a0c0. 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 14:34:12 - OpenVPN > Validating certificate key usage. 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 14:34:12 - OpenVPN > VERIFY KU OK. 2017.04.03 14:34:12 - OpenVPN > Validating certificate extended key usage. 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 14:34:12 - OpenVPN > VERIFY EKU OK. 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 14:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 14:34:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443. 2017.04.03 14:34:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.03 14:34:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0'. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.03 14:34:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.03 14:34:17 - OpenVPN > Opened utun device utun0. 2017.04.03 14:34:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.03 14:34:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0. 2017.04.03 14:34:17 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255. 2017.04.03 14:34:17 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.03 14:34:17 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.03 14:34:17 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.03 14:34:17 - Starting Management Interface. 2017.04.03 14:34:17 - OpenVPN > Initialization Sequence CompletedI 2017.04.03 14:34:17 - DNS of a network adapter forced (Ethernet)I 2017.04.03 14:34:17 - DNS of a network adapter forced (Wi-Fi)I 2017.04.03 14:34:17 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.03 14:34:17 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.03 14:34:17 - Flushing DNS. 2017.04.03 14:34:18 - OS X - PF rules updated, reloadingI 2017.04.03 14:34:18 - Checking routeI 2017.04.03 14:34:19 - Checking DNS! 2017.04.03 14:34:19 - Connected.. 2017.04.03 14:34:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.03 14:34:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.03 14:36:43 - Updating systems & servers data .... 2017.04.03 14:36:44 - Systems & servers data update completed. 2017.04.03 15:07:38 - Updating systems & servers data .... 2017.04.03 15:07:39 - Systems & servers data update completed. 2017.04.03 15:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=114372764/0 pkts=286783/0. 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 15:34:15 - OpenVPN > Validating certificate key usage. 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 15:34:15 - OpenVPN > VERIFY KU OK. 2017.04.03 15:34:15 - OpenVPN > Validating certificate extended key usage. 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 15:34:15 - OpenVPN > VERIFY EKU OK. 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 15:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 15:37:52 - Updating systems & servers data .... 2017.04.03 15:37:52 - Systems & servers data update completed. 2017.04.03 16:08:06 - Updating systems & servers data .... 2017.04.03 16:08:25 - Systems & servers data update completed. 2017.04.03 16:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=55751057/0 pkts=312959/0. 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 16:34:15 - OpenVPN > Validating certificate key usage. 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 16:34:15 - OpenVPN > VERIFY KU OK. 2017.04.03 16:34:15 - OpenVPN > Validating certificate extended key usage. 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 16:34:15 - OpenVPN > VERIFY EKU OK. 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 16:34:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 16:38:16 - Updating systems & servers data .... 2017.04.03 16:38:16 - Systems & servers data update completed. 2017.04.03 17:09:12 - Updating systems & servers data .... 2017.04.03 17:09:12 - OS X - PF rules updated, reloading. 2017.04.03 17:09:13 - Systems & servers data update completedI 2017.04.03 17:34:15 - Renewing TLS key. 2017.04.03 17:34:15 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 17:34:17 - OpenVPN > TLS: soft reset sec=0 bytes=15102625/0 pkts=42253/0. 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 17:34:17 - OpenVPN > Validating certificate key usage. 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 17:34:17 - OpenVPN > VERIFY KU OK. 2017.04.03 17:34:17 - OpenVPN > Validating certificate extended key usage. 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 17:34:17 - OpenVPN > VERIFY EKU OK. 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 17:34:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 17:40:08 - Updating systems & servers data .... 2017.04.03 17:40:09 - Systems & servers data update completed. 2017.04.03 18:11:04 - Updating systems & servers data .... 2017.04.03 18:11:06 - Systems & servers data update completedI 2017.04.03 18:34:17 - Renewing TLS key. 2017.04.03 18:34:17 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 18:34:19 - OpenVPN > TLS: soft reset sec=0 bytes=13987374/0 pkts=40248/0. 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 18:34:19 - OpenVPN > Validating certificate key usage. 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 18:34:19 - OpenVPN > VERIFY KU OK. 2017.04.03 18:34:19 - OpenVPN > Validating certificate extended key usage. 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 18:34:19 - OpenVPN > VERIFY EKU OK. 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 18:34:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 18:42:02 - Updating systems & servers data .... 2017.04.03 18:42:02 - Systems & servers data update completed. 2017.04.03 19:13:01 - Updating systems & servers data .... 2017.04.03 19:13:03 - Systems & servers data update completedI 2017.04.03 19:34:19 - Renewing TLS key. 2017.04.03 19:34:19 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 19:34:27 - OpenVPN > TLS: soft reset sec=0 bytes=43321137/0 pkts=83190/0. 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 19:34:27 - OpenVPN > Validating certificate key usage. 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 19:34:27 - OpenVPN > VERIFY KU OK. 2017.04.03 19:34:27 - OpenVPN > Validating certificate extended key usage. 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 19:34:27 - OpenVPN > VERIFY EKU OK. 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 19:34:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 19:43:09 - Updating systems & servers data .... 2017.04.03 19:43:10 - Systems & servers data update completed. 2017.04.03 20:14:08 - Updating systems & servers data .... 2017.04.03 20:14:08 - Systems & servers data update completedI 2017.04.03 20:34:27 - Renewing TLS key. 2017.04.03 20:34:27 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 20:34:35 - OpenVPN > TLS: soft reset sec=0 bytes=406592114/0 pkts=529431/0. 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 20:34:35 - OpenVPN > Validating certificate key usage. 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 20:34:35 - OpenVPN > VERIFY KU OK. 2017.04.03 20:34:35 - OpenVPN > Validating certificate extended key usage. 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 20:34:35 - OpenVPN > VERIFY EKU OK. 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 20:34:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 20:45:04 - Updating systems & servers data .... 2017.04.03 20:45:06 - Systems & servers data update completed. 2017.04.03 21:15:56 - Updating systems & servers data .... 2017.04.03 21:15:57 - Systems & servers data update completedI 2017.04.03 21:34:35 - Renewing TLS key. 2017.04.03 21:34:35 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 21:34:36 - OpenVPN > TLS: soft reset sec=0 bytes=74188922/0 pkts=107635/0. 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 21:34:36 - OpenVPN > Validating certificate key usage. 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 21:34:36 - OpenVPN > VERIFY KU OK. 2017.04.03 21:34:36 - OpenVPN > Validating certificate extended key usage. 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 21:34:36 - OpenVPN > VERIFY EKU OK. 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 21:34:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 21:46:47 - Updating systems & servers data .... 2017.04.03 21:46:48 - Systems & servers data update completed. 2017.04.03 22:17:41 - Updating systems & servers data .... 2017.04.03 22:17:43 - Systems & servers data update completedI 2017.04.03 22:34:36 - Renewing TLS key. 2017.04.03 22:34:36 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 22:34:44 - OpenVPN > TLS: soft reset sec=0 bytes=155541345/0 pkts=191560/0. 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 22:34:44 - OpenVPN > Validating certificate key usage. 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 22:34:44 - OpenVPN > VERIFY KU OK. 2017.04.03 22:34:44 - OpenVPN > Validating certificate extended key usage. 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 22:34:44 - OpenVPN > VERIFY EKU OK. 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 22:34:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 22:48:38 - Updating systems & servers data .... 2017.04.03 22:48:39 - Systems & servers data update completed. 2017.04.03 23:19:34 - Updating systems & servers data .... 2017.04.03 23:19:36 - Systems & servers data update completedI 2017.04.03 23:34:44 - Renewing TLS key. 2017.04.03 23:34:44 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.03 23:34:50 - OpenVPN > TLS: soft reset sec=0 bytes=543820781/0 pkts=624008/0. 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.03 23:34:50 - OpenVPN > Validating certificate key usage. 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.03 23:34:50 - OpenVPN > VERIFY KU OK. 2017.04.03 23:34:50 - OpenVPN > Validating certificate extended key usage. 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.03 23:34:50 - OpenVPN > VERIFY EKU OK. 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.03 23:34:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.03 23:50:31 - Updating systems & servers data .... 2017.04.03 23:50:32 - Systems & servers data update completed. 2017.04.04 00:21:28 - Updating systems & servers data .... 2017.04.04 00:21:36 - Systems & servers data update completedI 2017.04.04 00:34:50 - Renewing TLS key. 2017.04.04 00:34:50 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 00:34:51 - OpenVPN > TLS: soft reset sec=0 bytes=298572455/0 pkts=329031/0. 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 00:34:51 - OpenVPN > Validating certificate key usage. 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 00:34:51 - OpenVPN > VERIFY KU OK. 2017.04.04 00:34:51 - OpenVPN > Validating certificate extended key usage. 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 00:34:51 - OpenVPN > VERIFY EKU OK. 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 00:34:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 00:51:34 - Updating systems & servers data .... 2017.04.04 00:51:35 - Systems & servers data update completed. 2017.04.04 01:22:29 - Updating systems & servers data .... 2017.04.04 01:22:31 - Systems & servers data update completedI 2017.04.04 01:34:51 - Renewing TLS key. 2017.04.04 01:34:51 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 01:34:54 - OpenVPN > TLS: soft reset sec=0 bytes=304191023/0 pkts=343770/0. 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 01:34:54 - OpenVPN > Validating certificate key usage. 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 01:34:54 - OpenVPN > VERIFY KU OK. 2017.04.04 01:34:54 - OpenVPN > Validating certificate extended key usage. 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 01:34:54 - OpenVPN > VERIFY EKU OK. 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 01:35:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 01:53:27 - Updating systems & servers data .... 2017.04.04 01:53:28 - Systems & servers data update completed. 2017.04.04 02:23:35 - Updating systems & servers data .... 2017.04.04 02:23:37 - Systems & servers data update completedI 2017.04.04 02:34:54 - Renewing TLS key. 2017.04.04 02:34:54 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 02:35:00 - OpenVPN > Validating certificate key usage. 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 02:35:00 - OpenVPN > VERIFY KU OK. 2017.04.04 02:35:00 - OpenVPN > Validating certificate extended key usage. 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 02:35:00 - OpenVPN > VERIFY EKU OK. 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 02:35:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 02:46:45 - OS X - PF rules updated, reloading! 2017.04.04 02:46:45 - Disconnecting. 2017.04.04 02:46:45 - Management - Send 'signal SIGTERM'. 2017.04.04 02:46:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 02:46:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 213.152.162.98 192.168.0.1 255.255.255.255. 2017.04.04 02:46:50 - OpenVPN > delete net 213.152.162.98: gateway 192.168.0.1. 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 02:46:50 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 02:46:50 - Connection terminated.I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Ethernet). 2017.04.04 02:46:50 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 02:46:50 - OpenVPN > Closing TUN/TAP interface. 2017.04.04 02:46:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Ethernet)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Wi-Fi)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Bluetooth PAN)I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2017.04.04 02:46:50 - Session terminated.. 2017.04.04 02:53:41 - Updating systems & servers data .... 2017.04.04 02:53:41 - Systems & servers data update completed. 2017.04.04 03:24:35 - Updating systems & servers data .... 2017.04.04 03:24:36 - Systems & servers data update completed. 2017.04.04 03:55:30 - Updating systems & servers data .... 2017.04.04 03:55:30 - Systems & servers data update completed. 2017.04.04 04:26:24 - Updating systems & servers data .... 2017.04.04 04:26:25 - Systems & servers data update completed. 2017.04.04 04:57:19 - Updating systems & servers data .... 2017.04.04 04:57:20 - Systems & servers data update completed. 2017.04.04 05:28:14 - Updating systems & servers data .... 2017.04.04 05:28:14 - Systems & servers data update completed. 2017.04.04 05:59:09 - Updating systems & servers data .... 2017.04.04 05:59:09 - Systems & servers data update completed. 2017.04.04 06:30:03 - Updating systems & servers data .... 2017.04.04 06:30:04 - Systems & servers data update completed. 2017.04.04 07:00:58 - Updating systems & servers data .... 2017.04.04 07:00:59 - Systems & servers data update completed. 2017.04.04 07:31:53 - Updating systems & servers data .... 2017.04.04 07:31:53 - Systems & servers data update completed. 2017.04.04 08:02:48 - Updating systems & servers data .... 2017.04.04 08:02:48 - Systems & servers data update completed. 2017.04.04 08:33:42 - Updating systems & servers data .... 2017.04.04 08:33:42 - Systems & servers data update completed. 2017.04.04 09:04:36 - Updating systems & servers data .... 2017.04.04 09:04:37 - Systems & servers data update completed. 2017.04.04 09:35:31 - Updating systems & servers data .... 2017.04.04 09:35:32 - Systems & servers data update completed. 2017.04.04 10:06:26 - Updating systems & servers data .... 2017.04.04 10:06:26 - Systems & servers data update completed. 2017.04.04 10:37:21 - Updating systems & servers data .... 2017.04.04 10:37:21 - Systems & servers data update completed. 2017.04.04 11:08:16 - Updating systems & servers data .... 2017.04.04 11:08:16 - Systems & servers data update completed. 2017.04.04 11:39:11 - Updating systems & servers data .... 2017.04.04 11:39:11 - Systems & servers data update completed. 2017.04.04 12:10:05 - Updating systems & servers data .... 2017.04.04 12:10:06 - Systems & servers data update completed. 2017.04.04 12:41:00 - Updating systems & servers data .... 2017.04.04 12:41:01 - Systems & servers data update completedI 2017.04.04 12:43:48 - Session starting.I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Ethernet)I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Wi-Fi)I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Bluetooth PAN)I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2017.04.04 12:43:48 - Checking authorization ...! 2017.04.04 12:43:49 - Connecting to Gienah (Netherlands, Alblasserdam). 2017.04.04 12:43:49 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 12:43:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 12:43:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 12:43:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 12:43:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:49 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 12:43:49 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 12:43:49 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443. 2017.04.04 12:43:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=0359c113 770eb6f0. 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 12:43:49 - OpenVPN > Validating certificate key usage. 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 12:43:49 - OpenVPN > VERIFY KU OK. 2017.04.04 12:43:49 - OpenVPN > Validating certificate extended key usage. 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 12:43:49 - OpenVPN > VERIFY EKU OK. 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 12:43:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 12:43:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443. 2017.04.04 12:43:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 12:43:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.97 255.255.0.0'. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 12:43:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 12:43:53 - OpenVPN > route: writing to routing socket: File exists. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 12:43:53 - OpenVPN > Opened utun device utun0. 2017.04.04 12:43:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 12:43:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 10.4.70.97 10.4.70.97 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.70.97 255.255.0.0. 2017.04.04 12:43:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.70.97. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 213.152.162.93 192.168.0.1 255.255.255.255. 2017.04.04 12:43:53 - OpenVPN > add net 213.152.162.93: gateway 192.168.0.1: File exists. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 12:43:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 12:43:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 12:43:53 - Starting Management Interface. 2017.04.04 12:43:53 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 12:43:53 - DNS of a network adapter forced (Ethernet)I 2017.04.04 12:43:53 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 12:43:53 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 12:43:53 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 12:43:53 - Flushing DNS. 2017.04.04 12:43:53 - OS X - PF rules updated, reloadingI 2017.04.04 12:43:53 - Checking routeI 2017.04.04 12:43:54 - Checking DNS! 2017.04.04 12:43:54 - Connected.. 2017.04.04 12:43:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 12:43:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 13:11:57 - Updating systems & servers data .... 2017.04.04 13:12:00 - Systems & servers data update completed. 2017.04.04 13:42:58 - Updating systems & servers data .... 2017.04.04 13:42:59 - Systems & servers data update completed. 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 13:43:50 - OpenVPN > Validating certificate key usage. 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 13:43:50 - OpenVPN > VERIFY KU OK. 2017.04.04 13:43:50 - OpenVPN > Validating certificate extended key usage. 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 13:43:50 - OpenVPN > VERIFY EKU OK. 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 13:43:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 14:12:59 - Updating systems & servers data .... 2017.04.04 14:12:59 - Systems & servers data update completed. 2017.04.04 14:43:01 - Updating systems & servers data .... 2017.04.04 14:43:02 - Systems & servers data update completedI 2017.04.04 14:43:50 - Renewing TLS key. 2017.04.04 14:43:50 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 14:43:53 - OpenVPN > TLS: soft reset sec=0 bytes=13993207/0 pkts=33370/0. 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 14:43:54 - OpenVPN > Validating certificate key usage. 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 14:43:54 - OpenVPN > VERIFY KU OK. 2017.04.04 14:43:54 - OpenVPN > Validating certificate extended key usage. 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 14:43:54 - OpenVPN > VERIFY EKU OK. 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 14:43:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 15:14:03 - Updating systems & servers data .... 2017.04.04 15:14:03 - Systems & servers data update completed. 2017.04.04 15:31:13 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.04 15:31:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 15:31:13 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 15:31:13 - OS X - PF rules updated, reloading! 2017.04.04 15:31:13 - Disconnecting. 2017.04.04 15:31:13 - Management - Send 'signal SIGTERM'. 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 15:31:13 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 15:31:13 - OpenVPN > Exiting due to fatal error. 2017.04.04 15:31:14 - Connection terminated.I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 15:31:26 - Checking authorization ...! 2017.04.04 15:31:26 - Connecting to Subra (Netherlands, Alblasserdam). 2017.04.04 15:31:26 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 15:31:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 15:31:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 15:31:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 15:31:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:26 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 15:31:26 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 15:31:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443. 2017.04.04 15:31:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=82cabec5 26b9b800. 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 15:31:30 - OpenVPN > Validating certificate key usage. 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 15:31:30 - OpenVPN > VERIFY KU OK. 2017.04.04 15:31:30 - OpenVPN > Validating certificate extended key usage. 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 15:31:30 - OpenVPN > VERIFY EKU OK. 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 15:31:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 15:31:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443. 2017.04.04 15:31:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 15:31:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0'. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 15:31:36 - OpenVPN > Opened utun device utun0. 2017.04.04 15:31:36 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 15:31:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 15:31:36 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0. 2017.04.04 15:31:36 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255. 2017.04.04 15:31:36 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 15:31:36 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 15:31:36 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 15:31:36 - Starting Management Interface. 2017.04.04 15:31:36 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 15:31:36 - DNS of a network adapter forced (Ethernet)I 2017.04.04 15:31:36 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 15:31:36 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 15:31:36 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 15:31:36 - Flushing DNS. 2017.04.04 15:31:36 - OS X - PF rules updated, reloadingI 2017.04.04 15:31:36 - Checking routeI 2017.04.04 15:31:37 - Checking DNS! 2017.04.04 15:31:37 - Connected.. 2017.04.04 15:31:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 15:31:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 15:44:59 - Updating systems & servers data .... 2017.04.04 15:45:00 - Systems & servers data update completed. 2017.04.04 16:15:55 - Updating systems & servers data .... 2017.04.04 16:15:57 - Systems & servers data update completed. 2017.04.04 16:31:33 - OpenVPN > TLS: soft reset sec=0 bytes=5887067/0 pkts=22098/0. 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 16:31:33 - OpenVPN > Validating certificate key usage. 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 16:31:33 - OpenVPN > VERIFY KU OK. 2017.04.04 16:31:33 - OpenVPN > Validating certificate extended key usage. 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 16:31:33 - OpenVPN > VERIFY EKU OK. 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity). 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS handshake failed. 2017.04.04 16:32:33 - OpenVPN > TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1. 2017.04.04 16:32:34 - OpenVPN > [uNDEF] Inactivity timeout (--ping-restart), restarting. 2017.04.04 16:32:34 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 16:32:34 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 16:32:34 - OS X - PF rules updated, reloading! 2017.04.04 16:32:34 - Disconnecting. 2017.04.04 16:32:34 - Management - Send 'signal SIGTERM'. 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 16:32:34 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 16:32:34 - OpenVPN > Exiting due to fatal error. 2017.04.04 16:32:34 - Connection terminated.I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 16:32:48 - Checking authorization ...! 2017.04.04 16:32:48 - Connecting to Ancha (Netherlands, Alblasserdam). 2017.04.04 16:32:48 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 16:32:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 16:32:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 16:32:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 16:32:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:48 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 16:32:48 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 16:32:48 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.164:443. 2017.04.04 16:32:48 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=a3668ad5 f28645b8. 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 16:32:48 - OpenVPN > Validating certificate key usage. 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 16:32:48 - OpenVPN > VERIFY KU OK. 2017.04.04 16:32:48 - OpenVPN > Validating certificate extended key usage. 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 16:32:48 - OpenVPN > VERIFY EKU OK. 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 16:32:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 16:32:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443. 2017.04.04 16:33:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 16:33:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.53.187 255.255.0.0'. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 16:33:01 - OpenVPN > Opened utun device utun0. 2017.04.04 16:33:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 16:33:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 16:33:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 10.4.53.187 10.4.53.187 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.53.187 255.255.0.0. 2017.04.04 16:33:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.53.187. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 213.152.162.164 192.168.0.1 255.255.255.255. 2017.04.04 16:33:01 - OpenVPN > add net 213.152.162.164: gateway 192.168.0.1. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 16:33:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 16:33:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 16:33:01 - Starting Management Interface. 2017.04.04 16:33:01 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 16:33:01 - DNS of a network adapter forced (Ethernet)I 2017.04.04 16:33:01 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 16:33:01 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 16:33:01 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 16:33:01 - Flushing DNS. 2017.04.04 16:33:01 - OS X - PF rules updated, reloadingI 2017.04.04 16:33:01 - Checking routeI 2017.04.04 16:33:02 - Checking DNS! 2017.04.04 16:33:02 - Connected.. 2017.04.04 16:33:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 16:33:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 16:46:54 - Updating systems & servers data .... 2017.04.04 16:46:55 - Systems & servers data update completed. 2017.04.04 17:17:51 - Updating systems & servers data .... 2017.04.04 17:17:52 - Systems & servers data update completed. 2017.04.04 17:32:59 - OpenVPN > TLS: soft reset sec=0 bytes=32789571/0 pkts=61252/0. 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 17:33:02 - OpenVPN > Validating certificate key usage. 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 17:33:02 - OpenVPN > VERIFY KU OK. 2017.04.04 17:33:02 - OpenVPN > Validating certificate extended key usage. 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 17:33:02 - OpenVPN > VERIFY EKU OK. 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:33:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 17:36:59 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.04 17:36:59 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 17:36:59 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 17:36:59 - OS X - PF rules updated, reloading! 2017.04.04 17:36:59 - Disconnecting. 2017.04.04 17:36:59 - Management - Send 'signal SIGTERM'. 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 17:36:59 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 17:36:59 - OpenVPN > Exiting due to fatal error. 2017.04.04 17:37:00 - Connection terminated.I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 17:37:14 - Checking authorization ...! 2017.04.04 17:37:14 - Connecting to Alterf (Netherlands, Alblasserdam). 2017.04.04 17:37:14 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 17:37:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 17:37:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 17:37:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 17:37:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:14 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 17:37:14 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 17:37:14 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.169:443. 2017.04.04 17:37:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.169:443, sid=ae5243c6 b8e4d400. 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 17:37:14 - OpenVPN > Validating certificate key usage. 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 17:37:14 - OpenVPN > VERIFY KU OK. 2017.04.04 17:37:14 - OpenVPN > Validating certificate extended key usage. 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 17:37:14 - OpenVPN > VERIFY EKU OK. 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 17:37:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 17:37:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.169:443. 2017.04.04 17:37:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 17:37:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.250 255.255.0.0'. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 17:37:23 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 17:37:23 - OpenVPN > Opened utun device utun0. 2017.04.04 17:37:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 17:37:23 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 10.4.68.250 10.4.68.250 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.250 255.255.0.0. 2017.04.04 17:37:23 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.250. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 213.152.161.169 192.168.0.1 255.255.255.255. 2017.04.04 17:37:23 - OpenVPN > add net 213.152.161.169: gateway 192.168.0.1. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 17:37:23 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 17:37:23 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 17:37:23 - Starting Management Interface. 2017.04.04 17:37:23 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 17:37:23 - DNS of a network adapter forced (Ethernet)I 2017.04.04 17:37:23 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 17:37:23 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 17:37:23 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 17:37:23 - Flushing DNS. 2017.04.04 17:37:23 - OS X - PF rules updated, reloadingI 2017.04.04 17:37:23 - Checking routeI 2017.04.04 17:37:24 - Checking DNS! 2017.04.04 17:37:24 - Connected.. 2017.04.04 17:37:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 17:37:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 17:48:45 - Updating systems & servers data .... 2017.04.04 17:48:46 - Systems & servers data update completed. 2017.04.04 18:19:37 - Updating systems & servers data .... 2017.04.04 18:19:38 - Systems & servers data update completed. 2017.04.04 18:37:20 - OpenVPN > TLS: soft reset sec=0 bytes=49281504/0 pkts=75148/0. 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 18:37:20 - OpenVPN > Validating certificate key usage. 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 18:37:20 - OpenVPN > VERIFY KU OK. 2017.04.04 18:37:20 - OpenVPN > Validating certificate extended key usage. 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 18:37:20 - OpenVPN > VERIFY EKU OK. 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 18:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 18:50:29 - Updating systems & servers data .... 2017.04.04 18:50:31 - Systems & servers data update completed. 2017.04.04 19:21:22 - Updating systems & servers data .... 2017.04.04 19:21:24 - Systems & servers data update completedI 2017.04.04 19:37:20 - Renewing TLS key. 2017.04.04 19:37:20 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 19:37:26 - OpenVPN > Validating certificate key usage. 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 19:37:26 - OpenVPN > VERIFY KU OK. 2017.04.04 19:37:26 - OpenVPN > Validating certificate extended key usage. 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 19:37:26 - OpenVPN > VERIFY EKU OK. 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 19:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 19:52:15 - Updating systems & servers data .... 2017.04.04 19:52:17 - Systems & servers data update completed. 2017.04.04 20:23:08 - Updating systems & servers data .... 2017.04.04 20:23:09 - Systems & servers data update completed. 2017.04.04 20:37:26 - OpenVPN > TLS: soft reset sec=0 bytes=5063308/0 pkts=20058/0. 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 20:37:26 - OpenVPN > Validating certificate key usage. 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 20:37:26 - OpenVPN > VERIFY KU OK. 2017.04.04 20:37:26 - OpenVPN > Validating certificate extended key usage. 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 20:37:26 - OpenVPN > VERIFY EKU OK. 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 20:37:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 20:54:01 - Updating systems & servers data .... 2017.04.04 20:54:02 - Systems & servers data update completed. 2017.04.04 21:25:02 - Updating systems & servers data .... 2017.04.04 21:25:02 - Systems & servers data update completedI 2017.04.04 21:37:26 - Renewing TLS key. 2017.04.04 21:37:26 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 21:37:32 - OpenVPN > TLS: soft reset sec=0 bytes=6429402/0 pkts=22343/0. 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 21:37:32 - OpenVPN > Validating certificate key usage. 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 21:37:32 - OpenVPN > VERIFY KU OK. 2017.04.04 21:37:32 - OpenVPN > Validating certificate extended key usage. 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 21:37:32 - OpenVPN > VERIFY EKU OK. 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 21:37:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 21:55:10 - Updating systems & servers data .... 2017.04.04 21:55:11 - Systems & servers data update completed. 2017.04.04 22:25:19 - Updating systems & servers data .... 2017.04.04 22:25:20 - Systems & servers data update completedI 2017.04.04 22:37:32 - Renewing TLS key. 2017.04.04 22:37:32 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.04 22:37:41 - OpenVPN > TLS: soft reset sec=0 bytes=5115062/0 pkts=20304/0. 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 22:37:41 - OpenVPN > Validating certificate key usage. 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 22:37:41 - OpenVPN > VERIFY KU OK. 2017.04.04 22:37:41 - OpenVPN > Validating certificate extended key usage. 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 22:37:41 - OpenVPN > VERIFY EKU OK. 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 22:37:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 22:55:27 - Updating systems & servers data .... 2017.04.04 22:55:29 - Systems & servers data update completed. 2017.04.04 23:26:24 - Updating systems & servers data .... 2017.04.04 23:26:25 - Systems & servers data update completed. 2017.04.04 23:27:41 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.04 23:27:41 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.04 23:27:41 - OpenVPN > Restart pause, 2 second(s). 2017.04.04 23:27:41 - OS X - PF rules updated, reloading! 2017.04.04 23:27:41 - Disconnecting. 2017.04.04 23:27:41 - Management - Send 'signal SIGTERM'. 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.04 23:27:41 - OpenVPN > Assertion failed at misc.c:779. 2017.04.04 23:27:41 - OpenVPN > Exiting due to fatal error. 2017.04.04 23:27:41 - Connection terminated.I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.04 23:27:56 - Checking authorization ...! 2017.04.04 23:27:56 - Connecting to Alshat (Netherlands, Alblasserdam). 2017.04.04 23:27:56 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.04 23:27:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.04 23:27:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.04 23:27:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.04 23:27:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:56 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.04 23:27:56 - OpenVPN > UDPv4 link local: [undef]. 2017.04.04 23:27:56 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.4:443. 2017.04.04 23:27:56 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.4:443, sid=8afefa6f fea117d7. 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.04 23:27:58 - OpenVPN > Validating certificate key usage. 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.04 23:27:58 - OpenVPN > VERIFY KU OK. 2017.04.04 23:27:58 - OpenVPN > Validating certificate extended key usage. 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.04 23:27:58 - OpenVPN > VERIFY EKU OK. 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.04 23:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.04 23:27:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.4:443. 2017.04.04 23:28:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.04.04 23:28:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.151 255.255.0.0'. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.04 23:28:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.04 23:28:01 - OpenVPN > Opened utun device utun0. 2017.04.04 23:28:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.04 23:28:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 10.4.68.151 10.4.68.151 netmask 255.255.0.0 mtu 1500 up. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.151 255.255.0.0. 2017.04.04 23:28:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.151. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 213.152.161.4 192.168.0.1 255.255.255.255. 2017.04.04 23:28:01 - OpenVPN > add net 213.152.161.4: gateway 192.168.0.1. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 23:28:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.04 23:28:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.04 23:28:01 - Starting Management Interface. 2017.04.04 23:28:01 - OpenVPN > Initialization Sequence CompletedI 2017.04.04 23:28:01 - DNS of a network adapter forced (Ethernet)I 2017.04.04 23:28:01 - DNS of a network adapter forced (Wi-Fi)I 2017.04.04 23:28:01 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.04 23:28:01 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.04 23:28:01 - Flushing DNS. 2017.04.04 23:28:01 - OS X - PF rules updated, reloadingI 2017.04.04 23:28:01 - Checking routeI 2017.04.04 23:28:04 - Checking DNS! 2017.04.04 23:28:04 - Connected.. 2017.04.04 23:28:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.04 23:28:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.04 23:57:26 - Updating systems & servers data .... 2017.04.04 23:57:26 - Systems & servers data update completed. 2017.04.05 00:27:29 - Updating systems & servers data .... 2017.04.05 00:27:29 - Systems & servers data update completed. 2017.04.05 00:27:58 - OpenVPN > TLS: soft reset sec=0 bytes=91294170/0 pkts=283038/0. 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.05 00:27:58 - OpenVPN > Validating certificate key usage. 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.05 00:27:58 - OpenVPN > VERIFY KU OK. 2017.04.05 00:27:58 - OpenVPN > Validating certificate extended key usage. 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.05 00:27:58 - OpenVPN > VERIFY EKU OK. 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.05 00:43:17 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.04.05 00:43:17 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.04.05 00:43:17 - OpenVPN > Restart pause, 2 second(s). 2017.04.05 00:43:17 - OS X - PF rules updated, reloading! 2017.04.05 00:43:17 - Disconnecting. 2017.04.05 00:43:17 - Management - Send 'signal SIGTERM'. 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: Client disconnected. 2017.04.05 00:43:17 - OpenVPN > Assertion failed at misc.c:779. 2017.04.05 00:43:17 - OpenVPN > Exiting due to fatal error. 2017.04.05 00:43:17 - Connection terminated.I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Ethernet)I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Wi-Fi)I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2017.04.05 00:43:27 - Checking authorization ...! 2017.04.05 00:43:28 - Connecting to Hydrus (Netherlands, Alblasserdam). 2017.04.05 00:43:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.04.05 00:43:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.04.05 00:43:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2017.04.05 00:43:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.04.05 00:43:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:28 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2017.04.05 00:43:28 - OpenVPN > UDPv4 link local: [undef]. 2017.04.05 00:43:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.9:443. 2017.04.05 00:43:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.9:443, sid=a3a5b645 7b31f16d. 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.05 00:43:39 - OpenVPN > Validating certificate key usage. 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.05 00:43:39 - OpenVPN > VERIFY KU OK. 2017.04.05 00:43:39 - OpenVPN > Validating certificate extended key usage. 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.05 00:43:39 - OpenVPN > VERIFY EKU OK. 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hydrus, emailAddress=info@airvpn.org. 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.05 00:43:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.05 00:43:39 - OpenVPN > [Hydrus] Peer Connection Initiated with [AF_INET]213.152.162.9:443. 2017.04.05 00:43:41 - OpenVPN > SENT CONTROL [Hydrus]: 'PUSH_REQUEST' (status=1). 2017.04.05 00:43:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.186 255.255.0.0,peer-id 4'. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.04.05 00:43:41 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.05 00:43:41 - OpenVPN > route: writing to routing socket: File exists. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561. 2017.04.05 00:43:42 - OpenVPN > Opened utun device utun0. 2017.04.05 00:43:42 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 delete. 2017.04.05 00:43:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 10.4.5.186 10.4.5.186 netmask 255.255.0.0 mtu 1500 up. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.186 255.255.0.0. 2017.04.05 00:43:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.186. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 213.152.162.9 192.168.0.1 255.255.255.255. 2017.04.05 00:43:42 - OpenVPN > add net 213.152.162.9: gateway 192.168.0.1: File exists. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.04.05 00:43:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.04.05 00:43:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.04.05 00:43:42 - Starting Management Interface. 2017.04.05 00:43:42 - OpenVPN > Initialization Sequence CompletedI 2017.04.05 00:43:42 - DNS of a network adapter forced (Ethernet)I 2017.04.05 00:43:42 - DNS of a network adapter forced (Wi-Fi)I 2017.04.05 00:43:42 - DNS of a network adapter forced (Bluetooth PAN)I 2017.04.05 00:43:42 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.04.05 00:43:42 - Flushing DNS. 2017.04.05 00:43:42 - OS X - PF rules updated, reloadingI 2017.04.05 00:43:42 - Checking routeI 2017.04.05 00:43:46 - Checking DNS! 2017.04.05 00:43:46 - Connected.. 2017.04.05 00:43:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.05 00:43:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2017.04.05 00:58:22 - Updating systems & servers data ... . 2017.04.05 00:58:25 - Systems & servers data update completed What is this graph? p2p, speed test, youtube?The graph is upload / download over the period of an hour. The software used is "little snitch", which is firewall permission software if that helps. Quote Share this post Link to post
tuxornot 2 Posted ... If this is you state, over wifi then the problem could be anything from interference to a failing router/ access point, heck with wifi it could even be the way the wind blows :-p What router or access point as you using ? how old is it ? Redo the test over a wire lan connection if you can to compare wired to wifi. Thing to try: Change wifi channel Change channel bandwith from 20 to 40 to test Do not adjust any other settings and reboot your router / access point and try again - Quote Share this post Link to post
NinjaThunderbolt 4 Posted ... The connection is constantly dropping out for me, and it's really annoying. Am I the only one? I have been having the same problem for the past few days. VPN connection gets unusably slow for about 20-30 seconds, then goes back up, which creates problems with software and games that depend on a constant connection. Using both OpenVPN configs on Linux and Eddie on Windows. Quote Share this post Link to post
nick75 25 Posted ... Can you not see the log in my original post? I added it with an edit like 2 minutes after posting it.Logs? LogLogs weren't there when I replied but anyways...If it happens when not connected to the VPN, as tuxornot said, it's probably a Wi-Fi problem. Quote Share this post Link to post
ForgottenSkynet 0 Posted ... Alright well thanks for the responses. I will monitor the upload/download without the VPN. Quote Share this post Link to post
tuxornot 2 Posted ... Just adding to my suggestions regarding suspected wifi issues, first thing is to try a wired connection, if the problem still happens then its not the wifi as its been removed from the loop so to speak. I would then do a simple download test while not connected to any vpn but don’t put yourself at risk :-) Then try the vpn, use a different vpn server, if it still happens it could be your ISP service, if everything seems fine then try wifi again, move channels to see if it helps, bear in mind wifi is more like magic than science sometimes. All this testing can be a pain the rear but its necessary to spend time eliminating the most common causes mentioned here before looking at ISP or other possible problems, my experience of ISP support usually goes like this: vpn ? .... wazzat ?pfsense ?.... wazzat ?latency ?.....wazzat ? So I always do my part first with simple tests, it make my life easier ! -- -- Quote Share this post Link to post
NinjaThunderbolt 4 Posted ... The connection is constantly dropping out for me, and it's really annoying. Am I the only one? I have been having the same problem for the past few days. VPN connection gets unusably slow for about 20-30 seconds, then goes back up, which creates problems with software and games that depend on a constant connection. Using both OpenVPN configs on Linux and Eddie on Windows. Actually it seems to be a problem on my end, router probably needs to be replaced. Thank you! Quote Share this post Link to post
ForgottenSkynet 0 Posted ... the problem could be anything from interference to a failing router/ access point, heck with wifi it could even be the way the wind blows :-pWhat router or access point as you using ? how old is it ?It's a fairly new modem, only a couple years old maybe. Other computers in the house easily get 50mbps from it with no issues. Redo the test over a wire lan connection if you can to compare wired to wifi.I would then do a simple download test while not connected to any vpn but don’t put yourself at risk :-)Thing to try: Change wifi channel Change channel bandwith from 20 to 40 to test I might have a better alternative for further information, after experimenting for a few days. I run parallels, which is a virtual machine. For whatever reason, airlock does not work with it (so all internet connections made through windows are from my actual IP address). Might be to do with the OS directly accessing the hardware, not a problem. Anyway, I was in the middle of an online game on the windows side, when to my dismay, I heard the VPN disconnect. But everyone was still moving around, and I didn't disconnect. I also noticed that my mac was connected to wifi. If that's not evidence enough, what about this: When the connection becomes silent for over 10 seconds or so, the vpn will give up and disconnect from the server. However once it chooses a new server to connect to, it's instantly ok again. I'm pretty sure this can confirm that it's not to do with the wifi or the connection to my computer. Quote Share this post Link to post