scojoe 0 Posted ... Been using Air VPN for nearly a year. Today I can't connect to any server. The client sits at Checking Route for a while then times out. I've tried numerous servers with the same result. Have rebooted PC as well. Any ideas? I 2017.05.18 20:04:34 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64. 2017.05.18 20:04:34 - Reading options from C:\Users\user.DOMAIN\AppData\Local\AirVPN\AirVPN.xml. 2017.05.18 20:04:36 - Data Path: C:\Users\user.DOMAIN\AppData\Local\AirVPN. 2017.05.18 20:04:36 - App Path: C:\Program Files\AirVPN. 2017.05.18 20:04:36 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2017.05.18 20:04:36 - Command line arguments (1): path="home". 2017.05.18 20:04:36 - Updating systems & servers data .... 2017.05.18 20:04:36 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1I 2017.05.18 20:04:38 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2017.05.18 20:04:38 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2017.05.18 20:04:38 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2017.05.18 20:04:38 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2017.05.18 20:04:38 - Ready. 2017.05.18 20:04:40 - Systems & servers data update completedI 2017.05.18 20:05:08 - Session starting.I 2017.05.18 20:05:09 - IPv6 disabled.I 2017.05.18 20:05:09 - Checking authorization ...! 2017.05.18 20:05:09 - Connecting to Zibal (Netherlands, Alblasserdam). 2017.05.18 20:05:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.05.18 20:05:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.05.18 20:05:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.05.18 20:05:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.05.18 20:05:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:05:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:05:10 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2017.05.18 20:05:10 - OpenVPN > UDPv4 link local: [undef]. 2017.05.18 20:05:10 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.148:443. 2017.05.18 20:05:10 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.148:443, sid=40211557 b97bd30d. 2017.05.18 20:05:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.05.18 20:05:10 - OpenVPN > Validating certificate key usage. 2017.05.18 20:05:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.05.18 20:05:10 - OpenVPN > VERIFY KU OK. 2017.05.18 20:05:10 - OpenVPN > Validating certificate extended key usage. 2017.05.18 20:05:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.05.18 20:05:10 - OpenVPN > VERIFY EKU OK. 2017.05.18 20:05:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.05.18 20:05:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:05:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:05:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:05:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:05:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.05.18 20:05:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.148:443. 2017.05.18 20:05:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.05.18 20:05:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.69.112 255.255.0.0'. 2017.05.18 20:05:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.05.18 20:05:12 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.05.18 20:05:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.05.18 20:05:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.05.18 20:05:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.05.18 20:05:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.05.18 20:05:12 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.05.18 20:05:12 - OpenVPN > open_tun, tt->ipv6=0. 2017.05.18 20:05:12 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{45763E7D-F263-4306-9772-B7BD0F60C636}.tap. 2017.05.18 20:05:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.05.18 20:05:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.69.112/255.255.0.0 [sUCCEEDED]. 2017.05.18 20:05:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.69.112/255.255.0.0 on interface {45763E7D-F263-4306-9772-B7BD0F60C636} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.05.18 20:05:12 - OpenVPN > Successful ARP Flush on interface [13] {45763E7D-F263-4306-9772-B7BD0F60C636}. 2017.05.18 20:05:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.05.18 20:05:17 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.148 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:05:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2017.05.18 20:05:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:05:17 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:05:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:05:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:05:17 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:05:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:05:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:05:17 - Starting Management Interface. 2017.05.18 20:05:17 - OpenVPN > Initialization Sequence CompletedI 2017.05.18 20:05:17 - DNS of a network adapter forced (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:05:17 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.05.18 20:05:18 - Flushing DNSI 2017.05.18 20:05:18 - Checking routeW 2017.05.18 20:12:23 - The operation has timed out! 2017.05.18 20:12:23 - Disconnecting. 2017.05.18 20:12:23 - Management - Send 'signal SIGTERM'. 2017.05.18 20:12:23 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.05.18 20:12:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.05.18 20:12:23 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.05.18 20:12:28 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.148 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:12:28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:12:28 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:12:28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:12:28 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:12:28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:12:28 - OpenVPN > Closing TUN/TAP interface. 2017.05.18 20:12:28 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.05.18 20:12:28 - Connection terminated.I 2017.05.18 20:12:28 - DNS of a network adapter restored to original settings (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:12:28 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.05.18 20:12:31 - Checking authorization ...! 2017.05.18 20:12:31 - Connecting to Zibal (Netherlands, Alblasserdam). 2017.05.18 20:12:31 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.05.18 20:12:31 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.05.18 20:12:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.05.18 20:12:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.05.18 20:12:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:12:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:12:31 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2017.05.18 20:12:31 - OpenVPN > UDPv4 link local: [undef]. 2017.05.18 20:12:31 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.148:443. 2017.05.18 20:12:31 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.148:443, sid=85a4b03e ed63291c. 2017.05.18 20:12:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.05.18 20:12:32 - OpenVPN > Validating certificate key usage. 2017.05.18 20:12:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.05.18 20:12:32 - OpenVPN > VERIFY KU OK. 2017.05.18 20:12:32 - OpenVPN > Validating certificate extended key usage. 2017.05.18 20:12:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.05.18 20:12:32 - OpenVPN > VERIFY EKU OK. 2017.05.18 20:12:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.05.18 20:12:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:12:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:12:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:12:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:12:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.05.18 20:12:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.148:443. 2017.05.18 20:12:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.05.18 20:12:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.69.112 255.255.0.0'. 2017.05.18 20:12:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.05.18 20:12:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.05.18 20:12:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.05.18 20:12:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.05.18 20:12:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.05.18 20:12:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.05.18 20:12:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.05.18 20:12:36 - OpenVPN > open_tun, tt->ipv6=0. 2017.05.18 20:12:36 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{45763E7D-F263-4306-9772-B7BD0F60C636}.tap. 2017.05.18 20:12:36 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.05.18 20:12:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.69.112/255.255.0.0 [sUCCEEDED]. 2017.05.18 20:12:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.69.112/255.255.0.0 on interface {45763E7D-F263-4306-9772-B7BD0F60C636} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.05.18 20:12:36 - OpenVPN > Successful ARP Flush on interface [13] {45763E7D-F263-4306-9772-B7BD0F60C636}. 2017.05.18 20:12:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.05.18 20:12:41 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.148 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:12:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2017.05.18 20:12:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:12:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:12:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:12:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:12:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:12:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:12:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:12:41 - Starting Management Interface. 2017.05.18 20:12:41 - OpenVPN > Initialization Sequence CompletedI 2017.05.18 20:12:41 - DNS of a network adapter forced (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:12:41 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.05.18 20:12:41 - Flushing DNSI 2017.05.18 20:12:41 - Checking routeW 2017.05.18 20:19:42 - The operation has timed out! 2017.05.18 20:19:42 - Disconnecting. 2017.05.18 20:19:42 - Management - Send 'signal SIGTERM'. 2017.05.18 20:19:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.05.18 20:19:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.05.18 20:19:42 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.05.18 20:19:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.148 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:19:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:19:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:19:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:19:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:19:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:19:47 - OpenVPN > Closing TUN/TAP interface. 2017.05.18 20:19:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.05.18 20:19:47 - Connection terminated.I 2017.05.18 20:19:48 - DNS of a network adapter restored to original settings (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:19:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.05.18 20:19:53 - Checking authorization ...! 2017.05.18 20:19:53 - Connecting to Situla (Netherlands, Alblasserdam). 2017.05.18 20:19:53 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.05.18 20:19:53 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.05.18 20:19:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.05.18 20:19:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.05.18 20:19:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:19:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:19:53 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2017.05.18 20:19:53 - OpenVPN > UDPv4 link local: [undef]. 2017.05.18 20:19:53 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443. 2017.05.18 20:19:53 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=696709de 930c1ce0. 2017.05.18 20:19:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.05.18 20:19:54 - OpenVPN > Validating certificate key usage. 2017.05.18 20:19:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.05.18 20:19:54 - OpenVPN > VERIFY KU OK. 2017.05.18 20:19:54 - OpenVPN > Validating certificate extended key usage. 2017.05.18 20:19:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.05.18 20:19:54 - OpenVPN > VERIFY EKU OK. 2017.05.18 20:19:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.05.18 20:19:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:19:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:19:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:19:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:19:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.05.18 20:19:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443. 2017.05.18 20:19:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.05.18 20:19:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.116.170 255.255.0.0'. 2017.05.18 20:19:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.05.18 20:19:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.05.18 20:19:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.05.18 20:19:58 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.05.18 20:19:58 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.05.18 20:19:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.05.18 20:19:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.05.18 20:19:58 - OpenVPN > open_tun, tt->ipv6=0. 2017.05.18 20:19:58 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{45763E7D-F263-4306-9772-B7BD0F60C636}.tap. 2017.05.18 20:19:58 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.05.18 20:19:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.116.170/255.255.0.0 [sUCCEEDED]. 2017.05.18 20:19:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.116.170/255.255.0.0 on interface {45763E7D-F263-4306-9772-B7BD0F60C636} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.05.18 20:19:58 - OpenVPN > Successful ARP Flush on interface [13] {45763E7D-F263-4306-9772-B7BD0F60C636}. 2017.05.18 20:20:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.05.18 20:20:03 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.14 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:20:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2017.05.18 20:20:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:20:03 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:20:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:20:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:20:03 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:20:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:20:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:20:03 - Starting Management Interface. 2017.05.18 20:20:03 - OpenVPN > Initialization Sequence CompletedI 2017.05.18 20:20:03 - DNS of a network adapter forced (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:20:03 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.05.18 20:20:03 - Flushing DNSI 2017.05.18 20:20:03 - Checking routeW 2017.05.18 20:27:04 - The operation has timed out! 2017.05.18 20:27:04 - Disconnecting. 2017.05.18 20:27:04 - Management - Send 'signal SIGTERM'. 2017.05.18 20:27:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.05.18 20:27:04 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.05.18 20:27:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.05.18 20:27:04 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2017.05.18 20:27:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.14 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:27:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:27:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:27:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:27:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:27:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:27:09 - OpenVPN > Closing TUN/TAP interface. 2017.05.18 20:27:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.05.18 20:27:10 - Connection terminated.I 2017.05.18 20:27:10 - DNS of a network adapter restored to original settings (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:27:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.05.18 20:27:13 - Checking authorization ...! 2017.05.18 20:27:13 - Connecting to Situla (Netherlands, Alblasserdam). 2017.05.18 20:27:13 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.05.18 20:27:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.05.18 20:27:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.05.18 20:27:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.05.18 20:27:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:27:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:27:13 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2017.05.18 20:27:13 - OpenVPN > UDPv4 link local: [undef]. 2017.05.18 20:27:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443. 2017.05.18 20:27:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=bfb81cfa 42d7ed7b. 2017.05.18 20:27:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.05.18 20:27:13 - OpenVPN > Validating certificate key usage. 2017.05.18 20:27:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.05.18 20:27:13 - OpenVPN > VERIFY KU OK. 2017.05.18 20:27:13 - OpenVPN > Validating certificate extended key usage. 2017.05.18 20:27:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.05.18 20:27:13 - OpenVPN > VERIFY EKU OK. 2017.05.18 20:27:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.05.18 20:27:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:27:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:27:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:27:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:27:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.05.18 20:27:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443. 2017.05.18 20:27:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.05.18 20:27:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.116.170 255.255.0.0'. 2017.05.18 20:27:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.05.18 20:27:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.05.18 20:27:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.05.18 20:27:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.05.18 20:27:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.05.18 20:27:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.05.18 20:27:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.05.18 20:27:17 - OpenVPN > open_tun, tt->ipv6=0. 2017.05.18 20:27:17 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{45763E7D-F263-4306-9772-B7BD0F60C636}.tap. 2017.05.18 20:27:17 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.05.18 20:27:17 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.116.170/255.255.0.0 [sUCCEEDED]. 2017.05.18 20:27:17 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.116.170/255.255.0.0 on interface {45763E7D-F263-4306-9772-B7BD0F60C636} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.05.18 20:27:17 - OpenVPN > Successful ARP Flush on interface [13] {45763E7D-F263-4306-9772-B7BD0F60C636}. 2017.05.18 20:27:22 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.05.18 20:27:22 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.14 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:27:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2017.05.18 20:27:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:27:22 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:27:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:27:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:27:22 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:27:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:27:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:27:22 - Starting Management Interface. 2017.05.18 20:27:22 - OpenVPN > Initialization Sequence CompletedI 2017.05.18 20:27:22 - DNS of a network adapter forced (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:27:22 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.05.18 20:27:22 - Flushing DNSI 2017.05.18 20:27:22 - Checking routeW 2017.05.18 20:34:24 - The operation has timed out! 2017.05.18 20:34:24 - Disconnecting. 2017.05.18 20:34:24 - Management - Send 'signal SIGTERM'. 2017.05.18 20:34:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.05.18 20:34:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.05.18 20:34:24 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.05.18 20:34:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.14 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:34:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:34:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:34:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:34:29 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:34:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:34:29 - OpenVPN > Closing TUN/TAP interface. 2017.05.18 20:34:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.05.18 20:34:29 - Connection terminated.I 2017.05.18 20:34:29 - DNS of a network adapter restored to original settings (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:34:29 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.05.18 20:34:32 - Checking authorization ...! 2017.05.18 20:34:32 - Connecting to Situla (Netherlands, Alblasserdam). 2017.05.18 20:34:32 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.05.18 20:34:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.05.18 20:34:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.05.18 20:34:32 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.05.18 20:34:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:34:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:34:32 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2017.05.18 20:34:32 - OpenVPN > UDPv4 link local: [undef]. 2017.05.18 20:34:32 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443. 2017.05.18 20:34:33 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=b58128b3 3f5097a1. 2017.05.18 20:34:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.05.18 20:34:33 - OpenVPN > Validating certificate key usage. 2017.05.18 20:34:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.05.18 20:34:33 - OpenVPN > VERIFY KU OK. 2017.05.18 20:34:33 - OpenVPN > Validating certificate extended key usage. 2017.05.18 20:34:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.05.18 20:34:33 - OpenVPN > VERIFY EKU OK. 2017.05.18 20:34:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.05.18 20:34:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:34:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:34:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:34:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:34:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.05.18 20:34:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443. 2017.05.18 20:34:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.05.18 20:34:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.116.170 255.255.0.0'. 2017.05.18 20:34:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.05.18 20:34:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.05.18 20:34:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.05.18 20:34:38 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.05.18 20:34:38 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.05.18 20:34:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.05.18 20:34:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.05.18 20:34:38 - OpenVPN > open_tun, tt->ipv6=0. 2017.05.18 20:34:38 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{45763E7D-F263-4306-9772-B7BD0F60C636}.tap. 2017.05.18 20:34:38 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.05.18 20:34:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.116.170/255.255.0.0 [sUCCEEDED]. 2017.05.18 20:34:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.116.170/255.255.0.0 on interface {45763E7D-F263-4306-9772-B7BD0F60C636} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.05.18 20:34:38 - OpenVPN > Successful ARP Flush on interface [13] {45763E7D-F263-4306-9772-B7BD0F60C636}. 2017.05.18 20:34:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.05.18 20:34:43 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.14 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:34:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2017.05.18 20:34:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:34:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:34:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:34:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:34:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:34:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:34:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:34:43 - Starting Management Interface. 2017.05.18 20:34:43 - OpenVPN > Initialization Sequence CompletedI 2017.05.18 20:34:43 - DNS of a network adapter forced (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:34:43 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.05.18 20:34:43 - Flushing DNSI 2017.05.18 20:34:43 - Checking route. 2017.05.18 20:35:13 - Updating systems & servers data .... 2017.05.18 20:35:14 - Systems & servers data update completedW 2017.05.18 20:41:45 - The operation has timed out! 2017.05.18 20:41:45 - Disconnecting. 2017.05.18 20:41:45 - Management - Send 'signal SIGTERM'. 2017.05.18 20:41:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.05.18 20:41:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.05.18 20:41:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.05.18 20:41:50 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.14 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:41:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:41:50 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:41:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:41:50 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:41:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.05.18 20:41:50 - OpenVPN > Closing TUN/TAP interface. 2017.05.18 20:41:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.05.18 20:41:50 - Connection terminated.I 2017.05.18 20:41:50 - DNS of a network adapter restored to original settings (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:41:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.05.18 20:41:54 - Checking authorization ...! 2017.05.18 20:41:55 - Connecting to Alphard (Netherlands, Alblasserdam). 2017.05.18 20:41:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.05.18 20:41:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.05.18 20:41:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.05.18 20:41:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.05.18 20:41:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:41:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:41:55 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2017.05.18 20:41:55 - OpenVPN > UDPv4 link local: [undef]. 2017.05.18 20:41:55 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.9:443. 2017.05.18 20:41:55 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=799ab9ac 90ae3575. 2017.05.18 20:41:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.05.18 20:41:55 - OpenVPN > Validating certificate key usage. 2017.05.18 20:41:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.05.18 20:41:55 - OpenVPN > VERIFY KU OK. 2017.05.18 20:41:55 - OpenVPN > Validating certificate extended key usage. 2017.05.18 20:41:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.05.18 20:41:55 - OpenVPN > VERIFY EKU OK. 2017.05.18 20:41:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.05.18 20:41:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:41:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:41:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.05.18 20:41:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.05.18 20:41:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.05.18 20:41:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.9:443. 2017.05.18 20:42:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.05.18 20:42:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.121 255.255.0.0'. 2017.05.18 20:42:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.05.18 20:42:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.05.18 20:42:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.05.18 20:42:00 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.05.18 20:42:00 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.05.18 20:42:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.05.18 20:42:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.05.18 20:42:00 - OpenVPN > open_tun, tt->ipv6=0. 2017.05.18 20:42:00 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{45763E7D-F263-4306-9772-B7BD0F60C636}.tap. 2017.05.18 20:42:00 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.05.18 20:42:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.24.121/255.255.0.0 [sUCCEEDED]. 2017.05.18 20:42:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.24.121/255.255.0.0 on interface {45763E7D-F263-4306-9772-B7BD0F60C636} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.05.18 20:42:00 - OpenVPN > Successful ARP Flush on interface [13] {45763E7D-F263-4306-9772-B7BD0F60C636}. 2017.05.18 20:42:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.05.18 20:42:05 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.9 MASK 255.255.255.255 192.168.0.253. 2017.05.18 20:42:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2017.05.18 20:42:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:42:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:42:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:42:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:42:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.05.18 20:42:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.05.18 20:42:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.05.18 20:42:05 - Starting Management Interface. 2017.05.18 20:42:05 - OpenVPN > Initialization Sequence CompletedI 2017.05.18 20:42:05 - DNS of a network adapter forced (Intel® PRO/1000 MT Network Connection)I 2017.05.18 20:42:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.05.18 20:42:05 - Flushing DNSI 2017.05.18 20:42:05 - Checking route Quote Share this post Link to post
Doesi 3 Posted ... I don't know, if it helps, but you are using an old version of the Eddie-client. Please update to the current release 2.12.4 and try again. Quote Share this post Link to post
slidemaniac 1 Posted ... I had a similar issue some month ago. It helped to change the protocol from Automatic to TCP on port 443. Then I could connect each time to any server. Probably some UDP issue with my ISP back then. Lasted a bit and then Automatic mode worked again. Try TCP only. Quote Share this post Link to post