Jump to content
Not connected, Your IP: 3.145.39.53
Staff

Eddie 2.14beta released

Recommended Posts

 

What I've discovered is that if you refresh them while still connected, then the latency column will go completely blank

 

That's expected and intended. It's not a bug and it is not a different behavior than previous Eddie releases. The logic is that it makes sense to rate a server not from another server (otherwise the general system score would be more accurate), but from your node.

 

Kind regards

 

But if you let Eddie periodically auto-update the server list (whether you have the setting set for auto, 1 minute, 10 minutes, etc), then it *will* give new, updated ping times. The new times are usually similar to the times when you're not connected, and they are clearly not server-to-server because servers hosted by the same provider would naturally have very low latencies.

 

If the app's behavior is expected and intended when you click when you're connected, then why wouldn't it also be expected and intended when it auto-updates when you're connected?

Share this post


Link to post

Just wondering where the more recent source code is... I made a thread a couple weeks ago (link to thread) but haven't gotten any replies. Figured I'd post here since it's referring to the source for 2.14beta.

 

@Staff and @Clodo -- Care to comment on this?

Share this post


Link to post

But if you let Eddie periodically auto-update the server list (whether you have the setting set for auto, 1 minute, 10 minutes, etc), then it *will* give new, updated ping times.

 

The ping times are not updated from your node while the system is connected to the VPN, but other data are downloaded (very useful when you can't update such data while not connected to the VPN, for blocks etc.). Once you update manually, the old ping times are no more displayed.

 

Care to comment on this? [source code of beta versions]

 

Currently only stable versions source code is available. This is not immutable but it has been a habit so far for practical reasons.

 

Kind regards

Share this post


Link to post

 

 

Eddie 2.14.2 on Linux Mint 18 Cinnamon is still getting bootstrap error pop-ups for me.

 

Steps:

 

  1. Run Eddie as normal, connected to a location.
  2. Put PC into hibernation/sleep, mid-session.
  3. Re-open computer and Eddie sometimes shows bootstrap errors.
  • Network Lock On.
  • Air DNS On.
  • Check Air tunnel On.
  • UDP protocol.

Same here, only my PC is on 24/7, the bootstrap window sometimes (rarely)(twice since 2.14.2 hit the PPA) shows up after screensaver, Mint 18.3 Cinnamon.

 

Just got the "bootstrap" error for the second time this morning. Just cancelled to close the warning and all SEEMS fine. Both times, the warning was there when "waking" my iMac in the morning. The first time it happened was quite a few days ago. Here's my log:

. 2018.03.10 10:14:11 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 10:14:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 10:20:23 - Updating systems & servers data ...

. 2018.03.10 10:20:26 - Systems & servers data update completed

. 2018.03.10 10:30:37 - Updating systems & servers data ...

. 2018.03.10 10:30:40 - Systems & servers data update completed

. 2018.03.10 10:40:53 - Updating systems & servers data ...

. 2018.03.10 10:40:56 - Systems & servers data update completed

. 2018.03.10 10:51:01 - Updating systems & servers data ...

. 2018.03.10 10:51:03 - Systems & servers data update completed

. 2018.03.10 11:01:08 - Updating systems & servers data ...

. 2018.03.10 11:01:11 - Systems & servers data update completed

. 2018.03.10 11:11:17 - Updating systems & servers data ...

. 2018.03.10 11:11:19 - Systems & servers data update completed

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 11:14:11 - OpenVPN > VERIFY KU OK

. 2018.03.10 11:14:11 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 11:14:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 11:14:11 - OpenVPN > VERIFY EKU OK

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 11:21:26 - Updating systems & servers data ...

. 2018.03.10 11:21:29 - Systems & servers data update completed

. 2018.03.10 11:31:39 - Updating systems & servers data ...

. 2018.03.10 11:31:43 - Systems & servers data update completed

. 2018.03.10 11:41:49 - Updating systems & servers data ...

. 2018.03.10 11:41:54 - Systems & servers data update completed

. 2018.03.10 11:52:00 - Updating systems & servers data ...

. 2018.03.10 11:52:03 - Systems & servers data update completed

. 2018.03.10 12:02:11 - Updating systems & servers data ...

. 2018.03.10 12:02:13 - Systems & servers data update completed

. 2018.03.10 12:12:20 - Updating systems & servers data ...

. 2018.03.10 12:12:23 - Systems & servers data update completed

. 2018.03.10 12:14:11 - Renewing TLS key

. 2018.03.10 12:14:11 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > VERIFY KU OK

. 2018.03.10 12:14:12 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 12:14:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 12:14:12 - OpenVPN > VERIFY EKU OK

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 12:22:28 - Updating systems & servers data ...

. 2018.03.10 12:22:31 - Systems & servers data update completed

. 2018.03.10 12:32:36 - Updating systems & servers data ...

. 2018.03.10 12:32:44 - Systems & servers data update completed

. 2018.03.10 12:42:48 - Updating systems & servers data ...

. 2018.03.10 12:42:51 - Systems & servers data update completed

. 2018.03.10 12:53:03 - Updating systems & servers data ...

. 2018.03.10 12:53:08 - Systems & servers data update completed

. 2018.03.10 13:03:15 - Updating systems & servers data ...

. 2018.03.10 13:03:19 - Systems & servers data update completed

. 2018.03.10 13:13:24 - Updating systems & servers data ...

. 2018.03.10 13:13:27 - Systems & servers data update completed

. 2018.03.10 13:14:12 - OpenVPN > TLS: soft reset sec=0 bytes=11428602/-1 pkts=27756/0

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 13:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 13:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 13:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 13:23:33 - Updating systems & servers data ...

. 2018.03.10 13:23:36 - Systems & servers data update completed

. 2018.03.10 13:34:26 - Updating systems & servers data ...

. 2018.03.10 13:34:33 - Systems & servers data update completed

. 2018.03.10 13:44:38 - Updating systems & servers data ...

. 2018.03.10 13:44:42 - Systems & servers data update completed

. 2018.03.10 13:54:47 - Updating systems & servers data ...

. 2018.03.10 13:54:51 - Systems & servers data update completed

. 2018.03.10 14:04:57 - Updating systems & servers data ...

. 2018.03.10 14:05:03 - Systems & servers data update completed

. 2018.03.10 14:14:12 - Renewing TLS key

. 2018.03.10 14:14:12 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 14:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=4261915/-1 pkts=16397/0

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 14:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 14:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 14:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 14:15:09 - Updating systems & servers data ...

. 2018.03.10 14:15:13 - Systems & servers data update completed

. 2018.03.10 14:25:28 - Updating systems & servers data ...

. 2018.03.10 14:25:31 - Systems & servers data update completed

. 2018.03.10 14:35:45 - Updating systems & servers data ...

. 2018.03.10 14:35:50 - Systems & servers data update completed

. 2018.03.10 14:45:55 - Updating systems & servers data ...

. 2018.03.10 14:45:59 - Systems & servers data update completed

. 2018.03.10 14:56:04 - Updating systems & servers data ...

. 2018.03.10 14:56:12 - Systems & servers data update completed

. 2018.03.10 15:06:25 - Updating systems & servers data ...

. 2018.03.10 15:06:28 - Systems & servers data update completed

. 2018.03.10 15:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=29362742/-1 pkts=56917/0

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 15:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 15:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 15:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 15:16:40 - Updating systems & servers data ...

. 2018.03.10 15:16:43 - Systems & servers data update completed

. 2018.03.10 15:41:08 - Updating systems & servers data ...

. 2018.03.10 15:41:20 - Systems & servers data update completed

. 2018.03.10 15:51:44 - Updating systems & servers data ...

. 2018.03.10 15:51:53 - Systems & servers data update completed

. 2018.03.10 16:02:07 - Updating systems & servers data ...

. 2018.03.10 16:02:12 - Systems & servers data update completed

. 2018.03.10 16:12:20 - Updating systems & servers data ...

. 2018.03.10 16:12:23 - Systems & servers data update completed

. 2018.03.10 16:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=16284033/-1 pkts=34367/0

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 16:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 16:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 16:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 16:22:28 - Updating systems & servers data ...

. 2018.03.10 16:22:30 - Systems & servers data update completed

. 2018.03.10 16:32:35 - Updating systems & servers data ...

. 2018.03.10 16:32:44 - Systems & servers data update completed

. 2018.03.10 16:42:49 - Updating systems & servers data ...

. 2018.03.10 16:42:52 - Systems & servers data update completed

. 2018.03.10 16:52:57 - Updating systems & servers data ...

. 2018.03.10 16:53:00 - Systems & servers data update completed

. 2018.03.10 17:03:14 - Updating systems & servers data ...

. 2018.03.10 17:03:16 - Systems & servers data update completed

. 2018.03.10 17:13:22 - Updating systems & servers data ...

. 2018.03.10 17:13:25 - Systems & servers data update completed

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 17:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 17:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 17:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 17:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 17:23:36 - Updating systems & servers data ...

. 2018.03.10 17:23:39 - Systems & servers data update completed

. 2018.03.10 17:33:48 - Updating systems & servers data ...

. 2018.03.10 17:33:51 - Systems & servers data update completed

. 2018.03.10 17:43:56 - Updating systems & servers data ...

. 2018.03.10 17:43:58 - Systems & servers data update completed

. 2018.03.10 17:54:03 - Updating systems & servers data ...

. 2018.03.10 17:54:06 - Systems & servers data update completed

. 2018.03.10 18:04:11 - Updating systems & servers data ...

. 2018.03.10 18:04:14 - Systems & servers data update completed

. 2018.03.10 18:14:14 - Renewing TLS key

. 2018.03.10 18:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 18:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 18:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 18:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 18:14:19 - Updating systems & servers data ...

. 2018.03.10 18:14:22 - Systems & servers data update completed

. 2018.03.10 18:42:42 - Updating systems & servers data ...

. 2018.03.10 18:42:55 - Systems & servers data update completed

. 2018.03.10 19:08:00 - Updating systems & servers data ...

. 2018.03.10 19:08:06 - Systems & servers data update completed

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.10 19:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 19:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 19:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 19:19:24 - Updating systems & servers data ...

. 2018.03.10 19:19:26 - Systems & servers data update completed

. 2018.03.10 19:33:22 - Updating systems & servers data ...

. 2018.03.10 19:33:28 - Systems & servers data update completed

. 2018.03.10 20:01:00 - Updating systems & servers data ...

. 2018.03.10 20:01:14 - Systems & servers data update completed

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 20:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 20:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 20:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 20:14:19 - Updating systems & servers data ...

. 2018.03.10 20:14:25 - Systems & servers data update completed

. 2018.03.10 20:24:41 - Updating systems & servers data ...

. 2018.03.10 20:24:43 - Systems & servers data update completed

. 2018.03.10 20:34:48 - Updating systems & servers data ...

. 2018.03.10 20:34:50 - Systems & servers data update completed

. 2018.03.10 20:44:55 - Updating systems & servers data ...

. 2018.03.10 20:44:58 - Systems & servers data update completed

. 2018.03.10 20:55:03 - Updating systems & servers data ...

. 2018.03.10 20:55:05 - Systems & servers data update completed

. 2018.03.10 21:05:10 - Updating systems & servers data ...

. 2018.03.10 21:05:13 - Systems & servers data update completed

. 2018.03.10 21:14:14 - Renewing TLS key

. 2018.03.10 21:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 21:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 21:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 21:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 21:15:18 - Updating systems & servers data ...

. 2018.03.10 21:15:23 - Systems & servers data update completed

. 2018.03.10 21:36:01 - Updating systems & servers data ...

. 2018.03.10 21:36:17 - Systems & servers data update completed

. 2018.03.10 22:05:08 - Updating systems & servers data ...

. 2018.03.10 22:05:11 - Systems & servers data update completed

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > VERIFY KU OK

. 2018.03.10 22:14:19 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 22:14:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 22:14:19 - OpenVPN > VERIFY EKU OK

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 22:33:38 - Updating systems & servers data ...

. 2018.03.10 22:33:51 - Systems & servers data update completed

. 2018.03.10 23:07:32 - Updating systems & servers data ...

. 2018.03.10 23:08:00 - Systems & servers data update completed

. 2018.03.10 23:14:20 - OpenVPN > TLS: soft reset sec=0 bytes=267439940/-1 pkts=492179/0

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.10 23:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 23:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 23:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 23:40:12 - Updating systems & servers data ...

. 2018.03.10 23:40:23 - Systems & servers data update completed

. 2018.03.11 00:11:56 - Updating systems & servers data ...

. 2018.03.11 00:12:00 - Systems & servers data update completed

. 2018.03.11 00:14:22 - OpenVPN > TLS: soft reset sec=0 bytes=3248013/-1 pkts=13978/0

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.11 00:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 00:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 00:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 00:41:42 - Updating systems & servers data ...

. 2018.03.11 00:41:54 - Systems & servers data update completed

. 2018.03.11 01:11:46 - Updating systems & servers data ...

. 2018.03.11 01:11:51 - Systems & servers data update completed

. 2018.03.11 01:14:17 - OpenVPN > TLS: soft reset sec=0 bytes=3632647/-1 pkts=14731/0

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > VERIFY KU OK

. 2018.03.11 01:14:17 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 01:14:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 01:14:17 - OpenVPN > VERIFY EKU OK

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 01:37:00 - Updating systems & servers data ...

. 2018.03.11 01:37:16 - Systems & servers data update completed

. 2018.03.11 03:14:27 - Renewing TLS key

. 2018.03.11 03:14:27 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 03:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3466857/-1 pkts=14682/0

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 03:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 03:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 03:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 03:17:01 - Updating systems & servers data ...

. 2018.03.11 03:17:06 - Systems & servers data update completed

. 2018.03.11 03:58:00 - Updating systems & servers data ...

. 2018.03.11 03:58:05 - Systems & servers data update completed

. 2018.03.11 04:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3915096/-1 pkts=15788/0

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 04:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 04:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 04:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 04:40:00 - Updating systems & servers data ...

. 2018.03.11 04:40:22 - Systems & servers data update completed

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 05:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 05:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 05:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 05:20:41 - Updating systems & servers data ...

. 2018.03.11 05:21:00 - Systems & servers data update completed

. 2018.03.11 05:36:06 - Updating systems & servers data ...

. 2018.03.11 05:36:10 - Systems & servers data update completed

. 2018.03.11 05:46:21 - Updating systems & servers data ...

. 2018.03.11 05:46:24 - Systems & servers data update completed

. 2018.03.11 05:56:37 - Updating systems & servers data ...

. 2018.03.11 05:56:39 - Systems & servers data update completed

. 2018.03.11 06:06:47 - Updating systems & servers data ...

. 2018.03.11 06:06:51 - Systems & servers data update completed

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 06:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 06:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 06:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 06:16:59 - Updating systems & servers data ...

. 2018.03.11 06:17:02 - Systems & servers data update completed

. 2018.03.11 06:27:09 - Updating systems & servers data ...

. 2018.03.11 06:27:11 - Systems & servers data update completed

. 2018.03.11 06:37:23 - Updating systems & servers data ...

. 2018.03.11 06:37:25 - Systems & servers data update completed

. 2018.03.11 06:47:38 - Updating systems & servers data ...

. 2018.03.11 06:47:40 - Systems & servers data update completed

. 2018.03.11 06:57:49 - Updating systems & servers data ...

. 2018.03.11 06:57:52 - Systems & servers data update completed

. 2018.03.11 07:07:59 - Updating systems & servers data ...

. 2018.03.11 07:08:00 - Systems & servers data update completed

. 2018.03.11 07:14:16 - OpenVPN > TLS: soft reset sec=0 bytes=40452973/-1 pkts=66132/0

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 07:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 07:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 07:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 07:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 07:18:06 - Updating systems & servers data ...

. 2018.03.11 07:18:08 - Systems & servers data update completed

. 2018.03.11 07:28:13 - Updating systems & servers data ...

. 2018.03.11 07:28:19 - Systems & servers data update completed

. 2018.03.11 07:38:25 - Updating systems & servers data ...

. 2018.03.11 07:38:27 - Systems & servers data update completed

. 2018.03.11 07:57:13 - Updating systems & servers data ...

. 2018.03.11 07:57:15 - Systems & servers data update completed

. 2018.03.11 08:14:18 - Renewing TLS key

. 2018.03.11 08:14:18 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 08:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 08:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 08:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 08:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 08:14:56 - Updating systems & servers data ...

. 2018.03.11 08:15:04 - Systems & servers data update completed

. 2018.03.11 08:25:16 - Updating systems & servers data ...

. 2018.03.11 08:25:18 - Systems & servers data update completed

. 2018.03.11 08:35:26 - Updating systems & servers data ...

. 2018.03.11 08:35:28 - Systems & servers data update completed

. 2018.03.11 08:45:34 - Updating systems & servers data ...

. 2018.03.11 08:45:38 - Systems & servers data update completed

. 2018.03.11 08:55:49 - Updating systems & servers data ...

. 2018.03.11 08:55:51 - Systems & servers data update completed

. 2018.03.11 09:05:58 - Updating systems & servers data ...

. 2018.03.11 09:06:01 - Systems & servers data update completed

. 2018.03.11 09:14:17 - Renewing TLS key

. 2018.03.11 09:14:17 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 09:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=36221158/-1 pkts=59303/0

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 09:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 09:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 09:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 09:16:09 - Updating systems & servers data ...

. 2018.03.11 09:16:11 - Systems & servers data update completed

. 2018.03.11 09:26:21 - Updating systems & servers data ...

. 2018.03.11 09:26:24 - Systems & servers data update completed

. 2018.03.11 09:36:31 - Updating systems & servers data ...

. 2018.03.11 09:36:34 - Systems & servers data update completed

. 2018.03.11 09:46:39 - Updating systems & servers data ...

. 2018.03.11 09:46:42 - Systems & servers data update completed

. 2018.03.11 09:56:48 - Updating systems & servers data ...

. 2018.03.11 09:56:49 - Systems & servers data update completed

. 2018.03.11 10:06:56 - Updating systems & servers data ...

. 2018.03.11 10:06:59 - Systems & servers data update completed

. 2018.03.11 10:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=12504721/-1 pkts=29323/0

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 10:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 10:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 10:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 10:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 10:17:07 - Updating systems & servers data ...

. 2018.03.11 10:17:11 - Systems & servers data update completed

. 2018.03.11 10:27:18 - Updating systems & servers data ...

. 2018.03.11 10:27:20 - Systems & servers data update completed

. 2018.03.11 10:37:25 - Updating systems & servers data ...

. 2018.03.11 10:37:29 - Systems & servers data update completed

. 2018.03.11 10:47:34 - Updating systems & servers data ...

. 2018.03.11 10:47:37 - Systems & servers data update completed

. 2018.03.11 10:57:42 - Updating systems & servers data ...

. 2018.03.11 10:57:45 - Systems & servers data update completed

. 2018.03.11 11:14:28 - Renewing TLS key

. 2018.03.11 11:14:28 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 11:14:28 - OpenVPN > TLS: soft reset sec=0 bytes=6348225/-1 pkts=19902/0

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 11:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 11:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 11:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 11:31:51 - Updating systems & servers data ...

. 2018.03.11 11:31:54 - Systems & servers data update completed

. 2018.03.11 11:41:53 - Updating systems & servers data ...

. 2018.03.11 11:41:59 - Systems & servers data update completed

. 2018.03.11 11:52:07 - Updating systems & servers data ...

. 2018.03.11 11:52:12 - Systems & servers data update completed

. 2018.03.11 12:02:23 - Updating systems & servers data ...

. 2018.03.11 12:02:27 - Systems & servers data update completed

. 2018.03.11 12:12:36 - Updating systems & servers data ...

. 2018.03.11 12:12:39 - Systems & servers data update completed

. 2018.03.11 12:14:19 - Renewing TLS key

. 2018.03.11 12:14:19 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 12:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 12:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 12:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 12:22:49 - Updating systems & servers data ...

. 2018.03.11 12:22:52 - Systems & servers data update completed

. 2018.03.11 12:33:01 - Updating systems & servers data ...

. 2018.03.11 12:33:04 - Systems & servers data update completed

. 2018.03.11 12:43:14 - Updating systems & servers data ...

. 2018.03.11 12:43:17 - Systems & servers data update completed

. 2018.03.11 12:53:25 - Updating systems & servers data ...

. 2018.03.11 12:53:27 - Systems & servers data update completed

. 2018.03.11 13:03:32 - Updating systems & servers data ...

. 2018.03.11 13:03:36 - Systems & servers data update completed

. 2018.03.11 13:13:41 - Updating systems & servers data ...

. 2018.03.11 13:13:43 - Systems & servers data update completed

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 13:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 13:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 13:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 13:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 13:23:50 - Updating systems & servers data ...

. 2018.03.11 13:23:54 - Systems & servers data update completed

. 2018.03.11 13:33:59 - Updating systems & servers data ...

. 2018.03.11 13:34:01 - Systems & servers data update completed

. 2018.03.11 13:44:06 - Updating systems & servers data ...

. 2018.03.11 13:44:08 - Systems & servers data update completed

. 2018.03.11 13:54:14 - Updating systems & servers data ...

. 2018.03.11 13:54:16 - Systems & servers data update completed

. 2018.03.11 14:04:28 - Updating systems & servers data ...

. 2018.03.11 14:04:30 - Systems & servers data update completed

. 2018.03.11 14:14:20 - Renewing TLS key

. 2018.03.11 14:14:20 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 14:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=18715784/-1 pkts=33804/0

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 14:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 14:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 14:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 14:14:37 - Updating systems & servers data ...

. 2018.03.11 14:14:42 - Systems & servers data update completed

. 2018.03.11 14:24:47 - Updating systems & servers data ...

. 2018.03.11 14:24:50 - Systems & servers data update completed

. 2018.03.11 14:34:58 - Updating systems & servers data ...

. 2018.03.11 14:35:01 - Systems & servers data update completed

. 2018.03.11 14:45:09 - Updating systems & servers data ...

. 2018.03.11 14:45:12 - Systems & servers data update completed

. 2018.03.11 14:55:19 - Updating systems & servers data ...

. 2018.03.11 14:55:21 - Systems & servers data update completed

. 2018.03.11 15:05:32 - Updating systems & servers data ...

. 2018.03.11 15:05:35 - Systems & servers data update completed

. 2018.03.11 15:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=168183365/-1 pkts=248680/0

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 15:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 15:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 15:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 15:15:41 - Updating systems & servers data ...

. 2018.03.11 15:15:43 - Systems & servers data update completed

. 2018.03.11 15:25:48 - Updating systems & servers data ...

. 2018.03.11 15:25:50 - Systems & servers data update completed

. 2018.03.11 15:35:57 - Updating systems & servers data ...

. 2018.03.11 15:36:01 - Systems & servers data update completed

. 2018.03.11 15:46:10 - Updating systems & servers data ...

. 2018.03.11 15:46:12 - Systems & servers data update completed

. 2018.03.11 15:56:17 - Updating systems & servers data ...

. 2018.03.11 15:56:19 - Systems & servers data update completed

. 2018.03.11 16:06:24 - Updating systems & servers data ...

. 2018.03.11 16:06:27 - Systems & servers data update completed

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 16:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 16:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 16:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 16:16:32 - Updating systems & servers data ...

. 2018.03.11 16:16:38 - Systems & servers data update completed

. 2018.03.11 16:26:44 - Updating systems & servers data ...

. 2018.03.11 16:26:48 - Systems & servers data update completed

. 2018.03.11 16:36:57 - Updating systems & servers data ...

. 2018.03.11 16:36:59 - Systems & servers data update completed

. 2018.03.11 16:47:08 - Updating systems & servers data ...

. 2018.03.11 16:47:11 - Systems & servers data update completed

. 2018.03.11 16:57:21 - Updating systems & servers data ...

. 2018.03.11 16:57:24 - Systems & servers data update completed

. 2018.03.11 17:07:36 - Updating systems & servers data ...

. 2018.03.11 17:07:40 - Systems & servers data update completed

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 17:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 17:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 17:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 17:17:45 - Updating systems & servers data ...

. 2018.03.11 17:17:50 - Systems & servers data update completed

. 2018.03.11 17:27:57 - Updating systems & servers data ...

. 2018.03.11 17:28:01 - Systems & servers data update completed

. 2018.03.11 17:38:06 - Updating systems & servers data ...

. 2018.03.11 17:38:09 - Systems & servers data update completed

. 2018.03.11 17:48:16 - Updating systems & servers data ...

. 2018.03.11 17:48:19 - Systems & servers data update completed

. 2018.03.11 17:58:27 - Updating systems & servers data ...

. 2018.03.11 17:58:29 - Systems & servers data update completed

. 2018.03.11 18:08:34 - Updating systems & servers data ...

. 2018.03.11 18:08:37 - Systems & servers data update completed

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 18:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 18:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 18:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 18:18:43 - Updating systems & servers data ...

. 2018.03.11 18:18:46 - Systems & servers data update completed

. 2018.03.11 18:28:53 - Updating systems & servers data ...

. 2018.03.11 18:28:55 - Systems & servers data update completed

. 2018.03.11 18:39:06 - Updating systems & servers data ...

. 2018.03.11 18:39:09 - Systems & servers data update completed

. 2018.03.11 18:49:21 - Updating systems & servers data ...

. 2018.03.11 18:49:26 - Systems & servers data update completed

. 2018.03.11 18:59:36 - Updating systems & servers data ...

. 2018.03.11 18:59:40 - Systems & servers data update completed

. 2018.03.11 19:09:45 - Updating systems & servers data ...

. 2018.03.11 19:09:51 - Systems & servers data update completed

. 2018.03.11 19:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=36399159/-1 pkts=57275/0

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 19:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 19:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 19:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 19:19:57 - Updating systems & servers data ...

. 2018.03.11 19:20:00 - Systems & servers data update completed

. 2018.03.11 19:30:07 - Updating systems & servers data ...

. 2018.03.11 19:30:10 - Systems & servers data update completed

. 2018.03.11 19:40:22 - Updating systems & servers data ...

. 2018.03.11 19:40:26 - Systems & servers data update completed

. 2018.03.11 20:05:15 - Updating systems & servers data ...

. 2018.03.11 20:05:26 - Systems & servers data update completed

. 2018.03.11 20:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=9771731/-1 pkts=21291/0

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 20:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 20:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 20:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 20:27:21 - Updating systems & servers data ...

. 2018.03.11 20:27:31 - Systems & servers data update completed

. 2018.03.11 20:45:37 - Updating systems & servers data ...

. 2018.03.11 20:45:48 - Systems & servers data update completed

. 2018.03.11 21:11:56 - Updating systems & servers data ...

. 2018.03.11 21:12:01 - Systems & servers data update completed

. 2018.03.11 21:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=384457896/-1 pkts=720153/0

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 21:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 21:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 21:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 21:26:24 - Updating systems & servers data ...

. 2018.03.11 21:26:28 - Systems & servers data update completed

. 2018.03.11 21:36:40 - Updating systems & servers data ...

. 2018.03.11 21:36:43 - Systems & servers data update completed

. 2018.03.11 21:59:26 - Updating systems & servers data ...

. 2018.03.11 21:59:31 - Systems & servers data update completed

. 2018.03.11 22:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=13208309/-1 pkts=35758/0

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 22:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 22:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 22:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 22:27:00 - Updating systems & servers data ...

. 2018.03.11 22:27:13 - Systems & servers data update completed

. 2018.03.11 22:56:58 - Updating systems & servers data ...

. 2018.03.11 22:57:11 - Systems & servers data update completed

. 2018.03.11 23:14:26 - Renewing TLS key

. 2018.03.11 23:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 23:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4729920/-1 pkts=18755/0

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 23:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 23:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 23:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 23:21:42 - Updating systems & servers data ...

. 2018.03.11 23:21:52 - Systems & servers data update completed

. 2018.03.11 23:51:01 - Updating systems & servers data ...

. 2018.03.11 23:51:13 - Systems & servers data update completed

. 2018.03.12 00:14:26 - Renewing TLS key

. 2018.03.12 00:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 00:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=3709161/-1 pkts=15821/0

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 00:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 00:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 00:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 00:16:51 - Updating systems & servers data ...

. 2018.03.12 00:17:03 - Systems & servers data update completed

. 2018.03.12 00:47:00 - Updating systems & servers data ...

. 2018.03.12 00:47:05 - Systems & servers data update completed

. 2018.03.12 01:06:42 - Updating systems & servers data ...

. 2018.03.12 01:06:46 - Systems & servers data update completed

. 2018.03.12 01:14:26 - Renewing TLS key

. 2018.03.12 01:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 01:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=5011675/-1 pkts=20213/0

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 01:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 01:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 01:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 01:35:26 - Updating systems & servers data ...

. 2018.03.12 01:35:37 - Systems & servers data update completed

. 2018.03.12 02:04:46 - Updating systems & servers data ...

. 2018.03.12 02:14:24 - OpenVPN > TLS: soft reset sec=0 bytes=4579617/-1 pkts=19162/0

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 02:14:24 - OpenVPN > VERIFY KU OK

. 2018.03.12 02:14:24 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 02:14:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 02:14:24 - OpenVPN > VERIFY EKU OK

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 03:14:24 - Renewing TLS key

. 2018.03.12 03:14:24 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 03:14:25 - OpenVPN > VERIFY KU OK

. 2018.03.12 03:14:25 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 03:14:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 03:14:25 - OpenVPN > VERIFY EKU OK

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 04:14:25 - Renewing TLS key

. 2018.03.12 04:14:25 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 04:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4289468/-1 pkts=17966/0

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 04:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 04:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 04:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 05:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4133956/-1 pkts=17253/0

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 05:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 05:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 05:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 06:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4318074/-1 pkts=17867/0

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 06:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 06:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 06:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4527903/-1 pkts=18303/0

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:28:58 - Cannot retrieve systems & servers data. (Length of the data to decrypt is invalid. - Status: HTTP/1.1 502 Bad Gateway - Headers: server:nginx;date:Mon, 12 Mar 2018 09:04:47 GMT;content-type:text/html;content-length:1533;connection:keep-alive;etag:"5364e4bd-5fd"; - Body (1533 bytes): <!DOCTYPE HTML>

. 2018.03.12 07:28:58 -     <html>

. 2018.03.12 07:28:58 -     <body style="background-color:#EEEEEE;padding:0px;margin:0px;font-size:1.3em;font-family:Verdana,Arial;">

. 2018.03.12 07:28:58 -     <div style="height:80px; background-color: #5F7DAB; background-image: url('/error/header_gradient.png');background-repeat: repeat-x; font-size:1.0em">

. 2018.03.12 07:28:58 -     <img style="vertical-align: middle;" src="/error/header.png">

. 2018.03.12 07:28:58 -     <div style="float:right;padding-right:30px;padding-top:20px;color:white;font-size:1.5em;">We're sorry, our tubes are clogged up.</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <div style="clear:both;text-align:center;">

. 2018.03.12 07:28:58 -     <div style="margin:auto;padding:50px;width:900px;background-color:white;box-shadow: 0 0 20px #888;">

. 2018.03.12 07:28:58 -     <div style="float:right;margin:5px;width:400px;">

. 2018.03.12 07:28:58 -     <a class="twitter-timeline"  href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn" data-widget-id="259385580377481216">Tweets di @airvpn</a>

. 2018.03.12 07:28:58 -     <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="/external_image/?url=https%3A%2F%2Fplatform.twitter.com%2Fwidgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <p></p>

. 2018.03.12 07:28:58 -     <p>We're sorry, our tubes are clogged up.</p>

. 2018.03.12 07:28:58 -     <p>We're working to deliver more tubes on a bigger truck and solve the problem.</p>

. 2018.03.12 07:28:58 -     <p>Please see <a href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn">https://twitter.com/airvpn</a> for information and updates in the meantime.</p>

. 2018.03.12 07:28:58 -     <img style="margin-top:100px;" src="/error/tubes.jpg">

. 2018.03.12 07:28:58 -     <div style="clear:both;font-size:0.4em;margin-top:50px;color:gray">Backend LU</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </body>

. 2018.03.12 07:28:58 -     </html> )

. 2018.03.12 07:30:00 - Updating systems & servers data ...

. 2018.03.12 07:30:02 - Systems & servers data update completed

. 2018.03.12 07:40:15 - Updating systems & servers data ...

. 2018.03.12 07:40:17 - Systems & servers data update completed

. 2018.03.12 07:50:26 - Updating systems & servers data ...

. 2018.03.12 07:50:28 - Systems & servers data update completed

. 2018.03.12 07:58:35 - macOS - PF rules updated, reloading

! 2018.03.12 07:58:36 - Disconnecting

. 2018.03.12 07:58:37 - Routes, removed a route previously added, 71.19.252.114 for gateway 10.4.0.1

. 2018.03.12 07:58:37 - Sending management termination signal

. 2018.03.12 07:58:37 - Management - Send 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:42 - OpenVPN > delete net 71.19.252.113: gateway 192.168.1.254

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > Closing TUN/TAP interface

. 2018.03.12 07:58:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.12 07:58:42 - Connection terminated.

. 2018.03.12 07:58:45 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Ethernet)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (FireWire)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.03.12 07:58:49 - Checking authorization ...

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (FireWire)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.03.12 07:58:51 - Connecting to Aquila (United States, Fremont, California)

. 2018.03.12 07:58:51 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.12 07:58:51 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.12 07:58:51 - Connection to OpenVPN Management Interface

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.03.12 07:58:51 - OpenVPN > UDP link local: (not bound)

. 2018.03.12 07:58:51 - OpenVPN > UDP link remote: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.223.129:443, sid=a0b4f7a6 ec046c0e

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:58:51 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:58:51 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:58:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:58:51 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 07:58:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:58:52 - OpenVPN > [Aquila] Peer Connection Initiated with [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:53 - OpenVPN > SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1)

. 2018.03.12 07:58:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.157 255.255.0.0,peer-id 26,cipher AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.12 07:58:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.03.12 07:58:53 - OpenVPN > Opened utun device utun0

. 2018.03.12 07:58:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.03.12 07:58:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.12 07:58:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 10.4.2.157 10.4.2.157 netmask 255.255.0.0 mtu 1500 up

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.157 255.255.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.157

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 199.249.223.129 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:53 - OpenVPN > add net 199.249.223.129: gateway 192.168.1.254

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - Routes, added a new route, 199.249.223.130 for gateway 10.4.0.1

. 2018.03.12 07:58:54 - Flushing DNS

. 2018.03.12 07:58:54 - macOS - PF rules updated, reloading

I 2018.03.12 07:58:55 - Checking route IPv4

I 2018.03.12 07:58:56 - Checking DNS

! 2018.03.12 07:58:57 - Connected.

. 2018.03.12 07:58:57 - OpenVPN > Initialization Sequence Completed

. 2018.03.12 08:00:39 - Updating systems & servers data ...

. 2018.03.12 08:00:42 - Systems & servers data update completed

. 2018.03.12 08:10:55 - Updating systems & servers data ...

. 2018.03.12 08:10:57 - Systems & servers data update completed

. 2018.03.12 08:21:10 - Updating systems & servers data ...

. 2018.03.12 08:21:13 - Systems & servers data update completed

. 2018.03.12 08:31:20 - Updating systems & servers data ...

. 2018.03.12 08:31:23 - Systems & servers data update completed

. 2018.03.12 08:41:30 - Updating systems & servers data ...

. 2018.03.12 08:41:33 - Systems & servers data update completed

. 2018.03.12 08:51:39 - Updating systems & servers data ...

. 2018.03.12 08:51:42 - Systems & servers data update completed

. 2018.03.12 08:58:52 - OpenVPN > TLS: soft reset sec=0 bytes=3450446668/-1 pkts=4929422/0

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 08:58:52 - OpenVPN > VERIFY KU OK

. 2018.03.12 08:58:52 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 08:58:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 08:58:52 - OpenVPN > VERIFY EKU OK

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 08:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 09:01:46 - Updating systems & servers data ...

. 2018.03.12 09:01:51 - Systems & servers data update completed

. 2018.03.12 09:11:55 - Updating systems & servers data ...

. 2018.03.12 09:12:05 - Systems & servers data update completed

. 2018.03.12 09:22:20 - Updating systems & servers data ...

. 2018.03.12 09:22:28 - Systems & servers data update completed

. 2018.03.12 09:32:35 - Updating systems & servers data ...

. 2018.03.12 09:32:37 - Systems & servers data update completed

 

System log:

Eddie System/Environment Report - 3/12/2018 4:41 PM UTC

 

Eddie version: 2.14.2

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.11.6

OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.43.0 (/usr/bin/curl)

Profile path: /Users/madrat/.airvpn/AirVPN.xml

Data path: /Users/madrat/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Aquila

Detected DNS: 10.4.0.1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 45 ms

Test Ping IPv6: -1 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Error:curl: (7) Couldn't connect to server

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

connect: True

netlock: True

mode.protocol: SSL

mode.alt: 1

openvpn.management_port: 3101

 

----------------------------

Logs:

 

. 2018.03.10 10:14:11 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 10:14:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 10:20:23 - Updating systems & servers data ...

. 2018.03.10 10:20:26 - Systems & servers data update completed

. 2018.03.10 10:30:37 - Updating systems & servers data ...

. 2018.03.10 10:30:40 - Systems & servers data update completed

. 2018.03.10 10:40:53 - Updating systems & servers data ...

. 2018.03.10 10:40:56 - Systems & servers data update completed

. 2018.03.10 10:51:01 - Updating systems & servers data ...

. 2018.03.10 10:51:03 - Systems & servers data update completed

. 2018.03.10 11:01:08 - Updating systems & servers data ...

. 2018.03.10 11:01:11 - Systems & servers data update completed

. 2018.03.10 11:11:17 - Updating systems & servers data ...

. 2018.03.10 11:11:19 - Systems & servers data update completed

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 11:14:11 - OpenVPN > VERIFY KU OK

. 2018.03.10 11:14:11 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 11:14:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 11:14:11 - OpenVPN > VERIFY EKU OK

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 11:21:26 - Updating systems & servers data ...

. 2018.03.10 11:21:29 - Systems & servers data update completed

. 2018.03.10 11:31:39 - Updating systems & servers data ...

. 2018.03.10 11:31:43 - Systems & servers data update completed

. 2018.03.10 11:41:49 - Updating systems & servers data ...

. 2018.03.10 11:41:54 - Systems & servers data update completed

. 2018.03.10 11:52:00 - Updating systems & servers data ...

. 2018.03.10 11:52:03 - Systems & servers data update completed

. 2018.03.10 12:02:11 - Updating systems & servers data ...

. 2018.03.10 12:02:13 - Systems & servers data update completed

. 2018.03.10 12:12:20 - Updating systems & servers data ...

. 2018.03.10 12:12:23 - Systems & servers data update completed

. 2018.03.10 12:14:11 - Renewing TLS key

. 2018.03.10 12:14:11 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > VERIFY KU OK

. 2018.03.10 12:14:12 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 12:14:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 12:14:12 - OpenVPN > VERIFY EKU OK

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 12:22:28 - Updating systems & servers data ...

. 2018.03.10 12:22:31 - Systems & servers data update completed

. 2018.03.10 12:32:36 - Updating systems & servers data ...

. 2018.03.10 12:32:44 - Systems & servers data update completed

. 2018.03.10 12:42:48 - Updating systems & servers data ...

. 2018.03.10 12:42:51 - Systems & servers data update completed

. 2018.03.10 12:53:03 - Updating systems & servers data ...

. 2018.03.10 12:53:08 - Systems & servers data update completed

. 2018.03.10 13:03:15 - Updating systems & servers data ...

. 2018.03.10 13:03:19 - Systems & servers data update completed

. 2018.03.10 13:13:24 - Updating systems & servers data ...

. 2018.03.10 13:13:27 - Systems & servers data update completed

. 2018.03.10 13:14:12 - OpenVPN > TLS: soft reset sec=0 bytes=11428602/-1 pkts=27756/0

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 13:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 13:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 13:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 13:23:33 - Updating systems & servers data ...

. 2018.03.10 13:23:36 - Systems & servers data update completed

. 2018.03.10 13:34:26 - Updating systems & servers data ...

. 2018.03.10 13:34:33 - Systems & servers data update completed

. 2018.03.10 13:44:38 - Updating systems & servers data ...

. 2018.03.10 13:44:42 - Systems & servers data update completed

. 2018.03.10 13:54:47 - Updating systems & servers data ...

. 2018.03.10 13:54:51 - Systems & servers data update completed

. 2018.03.10 14:04:57 - Updating systems & servers data ...

. 2018.03.10 14:05:03 - Systems & servers data update completed

. 2018.03.10 14:14:12 - Renewing TLS key

. 2018.03.10 14:14:12 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 14:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=4261915/-1 pkts=16397/0

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 14:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 14:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 14:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 14:15:09 - Updating systems & servers data ...

. 2018.03.10 14:15:13 - Systems & servers data update completed

. 2018.03.10 14:25:28 - Updating systems & servers data ...

. 2018.03.10 14:25:31 - Systems & servers data update completed

. 2018.03.10 14:35:45 - Updating systems & servers data ...

. 2018.03.10 14:35:50 - Systems & servers data update completed

. 2018.03.10 14:45:55 - Updating systems & servers data ...

. 2018.03.10 14:45:59 - Systems & servers data update completed

. 2018.03.10 14:56:04 - Updating systems & servers data ...

. 2018.03.10 14:56:12 - Systems & servers data update completed

. 2018.03.10 15:06:25 - Updating systems & servers data ...

. 2018.03.10 15:06:28 - Systems & servers data update completed

. 2018.03.10 15:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=29362742/-1 pkts=56917/0

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 15:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 15:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 15:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 15:16:40 - Updating systems & servers data ...

. 2018.03.10 15:16:43 - Systems & servers data update completed

. 2018.03.10 15:41:08 - Updating systems & servers data ...

. 2018.03.10 15:41:20 - Systems & servers data update completed

. 2018.03.10 15:51:44 - Updating systems & servers data ...

. 2018.03.10 15:51:53 - Systems & servers data update completed

. 2018.03.10 16:02:07 - Updating systems & servers data ...

. 2018.03.10 16:02:12 - Systems & servers data update completed

. 2018.03.10 16:12:20 - Updating systems & servers data ...

. 2018.03.10 16:12:23 - Systems & servers data update completed

. 2018.03.10 16:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=16284033/-1 pkts=34367/0

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 16:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 16:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 16:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 16:22:28 - Updating systems & servers data ...

. 2018.03.10 16:22:30 - Systems & servers data update completed

. 2018.03.10 16:32:35 - Updating systems & servers data ...

. 2018.03.10 16:32:44 - Systems & servers data update completed

. 2018.03.10 16:42:49 - Updating systems & servers data ...

. 2018.03.10 16:42:52 - Systems & servers data update completed

. 2018.03.10 16:52:57 - Updating systems & servers data ...

. 2018.03.10 16:53:00 - Systems & servers data update completed

. 2018.03.10 17:03:14 - Updating systems & servers data ...

. 2018.03.10 17:03:16 - Systems & servers data update completed

. 2018.03.10 17:13:22 - Updating systems & servers data ...

. 2018.03.10 17:13:25 - Systems & servers data update completed

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 17:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 17:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 17:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 17:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 17:23:36 - Updating systems & servers data ...

. 2018.03.10 17:23:39 - Systems & servers data update completed

. 2018.03.10 17:33:48 - Updating systems & servers data ...

. 2018.03.10 17:33:51 - Systems & servers data update completed

. 2018.03.10 17:43:56 - Updating systems & servers data ...

. 2018.03.10 17:43:58 - Systems & servers data update completed

. 2018.03.10 17:54:03 - Updating systems & servers data ...

. 2018.03.10 17:54:06 - Systems & servers data update completed

. 2018.03.10 18:04:11 - Updating systems & servers data ...

. 2018.03.10 18:04:14 - Systems & servers data update completed

. 2018.03.10 18:14:14 - Renewing TLS key

. 2018.03.10 18:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 18:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 18:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 18:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 18:14:19 - Updating systems & servers data ...

. 2018.03.10 18:14:22 - Systems & servers data update completed

. 2018.03.10 18:42:42 - Updating systems & servers data ...

. 2018.03.10 18:42:55 - Systems & servers data update completed

. 2018.03.10 19:08:00 - Updating systems & servers data ...

. 2018.03.10 19:08:06 - Systems & servers data update completed

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.10 19:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 19:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 19:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 19:19:24 - Updating systems & servers data ...

. 2018.03.10 19:19:26 - Systems & servers data update completed

. 2018.03.10 19:33:22 - Updating systems & servers data ...

. 2018.03.10 19:33:28 - Systems & servers data update completed

. 2018.03.10 20:01:00 - Updating systems & servers data ...

. 2018.03.10 20:01:14 - Systems & servers data update completed

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 20:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 20:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 20:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 20:14:19 - Updating systems & servers data ...

. 2018.03.10 20:14:25 - Systems & servers data update completed

. 2018.03.10 20:24:41 - Updating systems & servers data ...

. 2018.03.10 20:24:43 - Systems & servers data update completed

. 2018.03.10 20:34:48 - Updating systems & servers data ...

. 2018.03.10 20:34:50 - Systems & servers data update completed

. 2018.03.10 20:44:55 - Updating systems & servers data ...

. 2018.03.10 20:44:58 - Systems & servers data update completed

. 2018.03.10 20:55:03 - Updating systems & servers data ...

. 2018.03.10 20:55:05 - Systems & servers data update completed

. 2018.03.10 21:05:10 - Updating systems & servers data ...

. 2018.03.10 21:05:13 - Systems & servers data update completed

. 2018.03.10 21:14:14 - Renewing TLS key

. 2018.03.10 21:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 21:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 21:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 21:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 21:15:18 - Updating systems & servers data ...

. 2018.03.10 21:15:23 - Systems & servers data update completed

. 2018.03.10 21:36:01 - Updating systems & servers data ...

. 2018.03.10 21:36:17 - Systems & servers data update completed

. 2018.03.10 22:05:08 - Updating systems & servers data ...

. 2018.03.10 22:05:11 - Systems & servers data update completed

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > VERIFY KU OK

. 2018.03.10 22:14:19 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 22:14:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 22:14:19 - OpenVPN > VERIFY EKU OK

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 22:33:38 - Updating systems & servers data ...

. 2018.03.10 22:33:51 - Systems & servers data update completed

. 2018.03.10 23:07:32 - Updating systems & servers data ...

. 2018.03.10 23:08:00 - Systems & servers data update completed

. 2018.03.10 23:14:20 - OpenVPN > TLS: soft reset sec=0 bytes=267439940/-1 pkts=492179/0

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.10 23:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 23:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 23:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 23:40:12 - Updating systems & servers data ...

. 2018.03.10 23:40:23 - Systems & servers data update completed

. 2018.03.11 00:11:56 - Updating systems & servers data ...

. 2018.03.11 00:12:00 - Systems & servers data update completed

. 2018.03.11 00:14:22 - OpenVPN > TLS: soft reset sec=0 bytes=3248013/-1 pkts=13978/0

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.11 00:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 00:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 00:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 00:41:42 - Updating systems & servers data ...

. 2018.03.11 00:41:54 - Systems & servers data update completed

. 2018.03.11 01:11:46 - Updating systems & servers data ...

. 2018.03.11 01:11:51 - Systems & servers data update completed

. 2018.03.11 01:14:17 - OpenVPN > TLS: soft reset sec=0 bytes=3632647/-1 pkts=14731/0

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > VERIFY KU OK

. 2018.03.11 01:14:17 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 01:14:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 01:14:17 - OpenVPN > VERIFY EKU OK

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 01:37:00 - Updating systems & servers data ...

. 2018.03.11 01:37:16 - Systems & servers data update completed

. 2018.03.11 03:14:27 - Renewing TLS key

. 2018.03.11 03:14:27 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 03:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3466857/-1 pkts=14682/0

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 03:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 03:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 03:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 03:17:01 - Updating systems & servers data ...

. 2018.03.11 03:17:06 - Systems & servers data update completed

. 2018.03.11 03:58:00 - Updating systems & servers data ...

. 2018.03.11 03:58:05 - Systems & servers data update completed

. 2018.03.11 04:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3915096/-1 pkts=15788/0

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 04:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 04:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 04:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 04:40:00 - Updating systems & servers data ...

. 2018.03.11 04:40:22 - Systems & servers data update completed

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 05:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 05:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 05:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 05:20:41 - Updating systems & servers data ...

. 2018.03.11 05:21:00 - Systems & servers data update completed

. 2018.03.11 05:36:06 - Updating systems & servers data ...

. 2018.03.11 05:36:10 - Systems & servers data update completed

. 2018.03.11 05:46:21 - Updating systems & servers data ...

. 2018.03.11 05:46:24 - Systems & servers data update completed

. 2018.03.11 05:56:37 - Updating systems & servers data ...

. 2018.03.11 05:56:39 - Systems & servers data update completed

. 2018.03.11 06:06:47 - Updating systems & servers data ...

. 2018.03.11 06:06:51 - Systems & servers data update completed

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 06:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 06:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 06:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 06:16:59 - Updating systems & servers data ...

. 2018.03.11 06:17:02 - Systems & servers data update completed

. 2018.03.11 06:27:09 - Updating systems & servers data ...

. 2018.03.11 06:27:11 - Systems & servers data update completed

. 2018.03.11 06:37:23 - Updating systems & servers data ...

. 2018.03.11 06:37:25 - Systems & servers data update completed

. 2018.03.11 06:47:38 - Updating systems & servers data ...

. 2018.03.11 06:47:40 - Systems & servers data update completed

. 2018.03.11 06:57:49 - Updating systems & servers data ...

. 2018.03.11 06:57:52 - Systems & servers data update completed

. 2018.03.11 07:07:59 - Updating systems & servers data ...

. 2018.03.11 07:08:00 - Systems & servers data update completed

. 2018.03.11 07:14:16 - OpenVPN > TLS: soft reset sec=0 bytes=40452973/-1 pkts=66132/0

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 07:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 07:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 07:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 07:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 07:18:06 - Updating systems & servers data ...

. 2018.03.11 07:18:08 - Systems & servers data update completed

. 2018.03.11 07:28:13 - Updating systems & servers data ...

. 2018.03.11 07:28:19 - Systems & servers data update completed

. 2018.03.11 07:38:25 - Updating systems & servers data ...

. 2018.03.11 07:38:27 - Systems & servers data update completed

. 2018.03.11 07:57:13 - Updating systems & servers data ...

. 2018.03.11 07:57:15 - Systems & servers data update completed

. 2018.03.11 08:14:18 - Renewing TLS key

. 2018.03.11 08:14:18 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 08:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 08:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 08:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 08:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 08:14:56 - Updating systems & servers data ...

. 2018.03.11 08:15:04 - Systems & servers data update completed

. 2018.03.11 08:25:16 - Updating systems & servers data ...

. 2018.03.11 08:25:18 - Systems & servers data update completed

. 2018.03.11 08:35:26 - Updating systems & servers data ...

. 2018.03.11 08:35:28 - Systems & servers data update completed

. 2018.03.11 08:45:34 - Updating systems & servers data ...

. 2018.03.11 08:45:38 - Systems & servers data update completed

. 2018.03.11 08:55:49 - Updating systems & servers data ...

. 2018.03.11 08:55:51 - Systems & servers data update completed

. 2018.03.11 09:05:58 - Updating systems & servers data ...

. 2018.03.11 09:06:01 - Systems & servers data update completed

. 2018.03.11 09:14:17 - Renewing TLS key

. 2018.03.11 09:14:17 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 09:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=36221158/-1 pkts=59303/0

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 09:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 09:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 09:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 09:16:09 - Updating systems & servers data ...

. 2018.03.11 09:16:11 - Systems & servers data update completed

. 2018.03.11 09:26:21 - Updating systems & servers data ...

. 2018.03.11 09:26:24 - Systems & servers data update completed

. 2018.03.11 09:36:31 - Updating systems & servers data ...

. 2018.03.11 09:36:34 - Systems & servers data update completed

. 2018.03.11 09:46:39 - Updating systems & servers data ...

. 2018.03.11 09:46:42 - Systems & servers data update completed

. 2018.03.11 09:56:48 - Updating systems & servers data ...

. 2018.03.11 09:56:49 - Systems & servers data update completed

. 2018.03.11 10:06:56 - Updating systems & servers data ...

. 2018.03.11 10:06:59 - Systems & servers data update completed

. 2018.03.11 10:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=12504721/-1 pkts=29323/0

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 10:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 10:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 10:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 10:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 10:17:07 - Updating systems & servers data ...

. 2018.03.11 10:17:11 - Systems & servers data update completed

. 2018.03.11 10:27:18 - Updating systems & servers data ...

. 2018.03.11 10:27:20 - Systems & servers data update completed

. 2018.03.11 10:37:25 - Updating systems & servers data ...

. 2018.03.11 10:37:29 - Systems & servers data update completed

. 2018.03.11 10:47:34 - Updating systems & servers data ...

. 2018.03.11 10:47:37 - Systems & servers data update completed

. 2018.03.11 10:57:42 - Updating systems & servers data ...

. 2018.03.11 10:57:45 - Systems & servers data update completed

. 2018.03.11 11:14:28 - Renewing TLS key

. 2018.03.11 11:14:28 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 11:14:28 - OpenVPN > TLS: soft reset sec=0 bytes=6348225/-1 pkts=19902/0

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 11:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 11:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 11:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 11:31:51 - Updating systems & servers data ...

. 2018.03.11 11:31:54 - Systems & servers data update completed

. 2018.03.11 11:41:53 - Updating systems & servers data ...

. 2018.03.11 11:41:59 - Systems & servers data update completed

. 2018.03.11 11:52:07 - Updating systems & servers data ...

. 2018.03.11 11:52:12 - Systems & servers data update completed

. 2018.03.11 12:02:23 - Updating systems & servers data ...

. 2018.03.11 12:02:27 - Systems & servers data update completed

. 2018.03.11 12:12:36 - Updating systems & servers data ...

. 2018.03.11 12:12:39 - Systems & servers data update completed

. 2018.03.11 12:14:19 - Renewing TLS key

. 2018.03.11 12:14:19 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 12:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 12:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 12:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 12:22:49 - Updating systems & servers data ...

. 2018.03.11 12:22:52 - Systems & servers data update completed

. 2018.03.11 12:33:01 - Updating systems & servers data ...

. 2018.03.11 12:33:04 - Systems & servers data update completed

. 2018.03.11 12:43:14 - Updating systems & servers data ...

. 2018.03.11 12:43:17 - Systems & servers data update completed

. 2018.03.11 12:53:25 - Updating systems & servers data ...

. 2018.03.11 12:53:27 - Systems & servers data update completed

. 2018.03.11 13:03:32 - Updating systems & servers data ...

. 2018.03.11 13:03:36 - Systems & servers data update completed

. 2018.03.11 13:13:41 - Updating systems & servers data ...

. 2018.03.11 13:13:43 - Systems & servers data update completed

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 13:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 13:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 13:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 13:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 13:23:50 - Updating systems & servers data ...

. 2018.03.11 13:23:54 - Systems & servers data update completed

. 2018.03.11 13:33:59 - Updating systems & servers data ...

. 2018.03.11 13:34:01 - Systems & servers data update completed

. 2018.03.11 13:44:06 - Updating systems & servers data ...

. 2018.03.11 13:44:08 - Systems & servers data update completed

. 2018.03.11 13:54:14 - Updating systems & servers data ...

. 2018.03.11 13:54:16 - Systems & servers data update completed

. 2018.03.11 14:04:28 - Updating systems & servers data ...

. 2018.03.11 14:04:30 - Systems & servers data update completed

. 2018.03.11 14:14:20 - Renewing TLS key

. 2018.03.11 14:14:20 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 14:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=18715784/-1 pkts=33804/0

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 14:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 14:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 14:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 14:14:37 - Updating systems & servers data ...

. 2018.03.11 14:14:42 - Systems & servers data update completed

. 2018.03.11 14:24:47 - Updating systems & servers data ...

. 2018.03.11 14:24:50 - Systems & servers data update completed

. 2018.03.11 14:34:58 - Updating systems & servers data ...

. 2018.03.11 14:35:01 - Systems & servers data update completed

. 2018.03.11 14:45:09 - Updating systems & servers data ...

. 2018.03.11 14:45:12 - Systems & servers data update completed

. 2018.03.11 14:55:19 - Updating systems & servers data ...

. 2018.03.11 14:55:21 - Systems & servers data update completed

. 2018.03.11 15:05:32 - Updating systems & servers data ...

. 2018.03.11 15:05:35 - Systems & servers data update completed

. 2018.03.11 15:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=168183365/-1 pkts=248680/0

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 15:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 15:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 15:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 15:15:41 - Updating systems & servers data ...

. 2018.03.11 15:15:43 - Systems & servers data update completed

. 2018.03.11 15:25:48 - Updating systems & servers data ...

. 2018.03.11 15:25:50 - Systems & servers data update completed

. 2018.03.11 15:35:57 - Updating systems & servers data ...

. 2018.03.11 15:36:01 - Systems & servers data update completed

. 2018.03.11 15:46:10 - Updating systems & servers data ...

. 2018.03.11 15:46:12 - Systems & servers data update completed

. 2018.03.11 15:56:17 - Updating systems & servers data ...

. 2018.03.11 15:56:19 - Systems & servers data update completed

. 2018.03.11 16:06:24 - Updating systems & servers data ...

. 2018.03.11 16:06:27 - Systems & servers data update completed

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 16:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 16:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 16:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 16:16:32 - Updating systems & servers data ...

. 2018.03.11 16:16:38 - Systems & servers data update completed

. 2018.03.11 16:26:44 - Updating systems & servers data ...

. 2018.03.11 16:26:48 - Systems & servers data update completed

. 2018.03.11 16:36:57 - Updating systems & servers data ...

. 2018.03.11 16:36:59 - Systems & servers data update completed

. 2018.03.11 16:47:08 - Updating systems & servers data ...

. 2018.03.11 16:47:11 - Systems & servers data update completed

. 2018.03.11 16:57:21 - Updating systems & servers data ...

. 2018.03.11 16:57:24 - Systems & servers data update completed

. 2018.03.11 17:07:36 - Updating systems & servers data ...

. 2018.03.11 17:07:40 - Systems & servers data update completed

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 17:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 17:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 17:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 17:17:45 - Updating systems & servers data ...

. 2018.03.11 17:17:50 - Systems & servers data update completed

. 2018.03.11 17:27:57 - Updating systems & servers data ...

. 2018.03.11 17:28:01 - Systems & servers data update completed

. 2018.03.11 17:38:06 - Updating systems & servers data ...

. 2018.03.11 17:38:09 - Systems & servers data update completed

. 2018.03.11 17:48:16 - Updating systems & servers data ...

. 2018.03.11 17:48:19 - Systems & servers data update completed

. 2018.03.11 17:58:27 - Updating systems & servers data ...

. 2018.03.11 17:58:29 - Systems & servers data update completed

. 2018.03.11 18:08:34 - Updating systems & servers data ...

. 2018.03.11 18:08:37 - Systems & servers data update completed

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 18:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 18:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 18:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 18:18:43 - Updating systems & servers data ...

. 2018.03.11 18:18:46 - Systems & servers data update completed

. 2018.03.11 18:28:53 - Updating systems & servers data ...

. 2018.03.11 18:28:55 - Systems & servers data update completed

. 2018.03.11 18:39:06 - Updating systems & servers data ...

. 2018.03.11 18:39:09 - Systems & servers data update completed

. 2018.03.11 18:49:21 - Updating systems & servers data ...

. 2018.03.11 18:49:26 - Systems & servers data update completed

. 2018.03.11 18:59:36 - Updating systems & servers data ...

. 2018.03.11 18:59:40 - Systems & servers data update completed

. 2018.03.11 19:09:45 - Updating systems & servers data ...

. 2018.03.11 19:09:51 - Systems & servers data update completed

. 2018.03.11 19:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=36399159/-1 pkts=57275/0

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 19:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 19:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 19:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 19:19:57 - Updating systems & servers data ...

. 2018.03.11 19:20:00 - Systems & servers data update completed

. 2018.03.11 19:30:07 - Updating systems & servers data ...

. 2018.03.11 19:30:10 - Systems & servers data update completed

. 2018.03.11 19:40:22 - Updating systems & servers data ...

. 2018.03.11 19:40:26 - Systems & servers data update completed

. 2018.03.11 20:05:15 - Updating systems & servers data ...

. 2018.03.11 20:05:26 - Systems & servers data update completed

. 2018.03.11 20:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=9771731/-1 pkts=21291/0

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 20:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 20:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 20:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 20:27:21 - Updating systems & servers data ...

. 2018.03.11 20:27:31 - Systems & servers data update completed

. 2018.03.11 20:45:37 - Updating systems & servers data ...

. 2018.03.11 20:45:48 - Systems & servers data update completed

. 2018.03.11 21:11:56 - Updating systems & servers data ...

. 2018.03.11 21:12:01 - Systems & servers data update completed

. 2018.03.11 21:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=384457896/-1 pkts=720153/0

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 21:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 21:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 21:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 21:26:24 - Updating systems & servers data ...

. 2018.03.11 21:26:28 - Systems & servers data update completed

. 2018.03.11 21:36:40 - Updating systems & servers data ...

. 2018.03.11 21:36:43 - Systems & servers data update completed

. 2018.03.11 21:59:26 - Updating systems & servers data ...

. 2018.03.11 21:59:31 - Systems & servers data update completed

. 2018.03.11 22:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=13208309/-1 pkts=35758/0

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 22:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 22:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 22:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 22:27:00 - Updating systems & servers data ...

. 2018.03.11 22:27:13 - Systems & servers data update completed

. 2018.03.11 22:56:58 - Updating systems & servers data ...

. 2018.03.11 22:57:11 - Systems & servers data update completed

. 2018.03.11 23:14:26 - Renewing TLS key

. 2018.03.11 23:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 23:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4729920/-1 pkts=18755/0

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 23:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 23:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 23:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 23:21:42 - Updating systems & servers data ...

. 2018.03.11 23:21:52 - Systems & servers data update completed

. 2018.03.11 23:51:01 - Updating systems & servers data ...

. 2018.03.11 23:51:13 - Systems & servers data update completed

. 2018.03.12 00:14:26 - Renewing TLS key

. 2018.03.12 00:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 00:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=3709161/-1 pkts=15821/0

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 00:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 00:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 00:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 00:16:51 - Updating systems & servers data ...

. 2018.03.12 00:17:03 - Systems & servers data update completed

. 2018.03.12 00:47:00 - Updating systems & servers data ...

. 2018.03.12 00:47:05 - Systems & servers data update completed

. 2018.03.12 01:06:42 - Updating systems & servers data ...

. 2018.03.12 01:06:46 - Systems & servers data update completed

. 2018.03.12 01:14:26 - Renewing TLS key

. 2018.03.12 01:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 01:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=5011675/-1 pkts=20213/0

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 01:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 01:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 01:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 01:35:26 - Updating systems & servers data ...

. 2018.03.12 01:35:37 - Systems & servers data update completed

. 2018.03.12 02:04:46 - Updating systems & servers data ...

. 2018.03.12 02:14:24 - OpenVPN > TLS: soft reset sec=0 bytes=4579617/-1 pkts=19162/0

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 02:14:24 - OpenVPN > VERIFY KU OK

. 2018.03.12 02:14:24 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 02:14:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 02:14:24 - OpenVPN > VERIFY EKU OK

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 03:14:24 - Renewing TLS key

. 2018.03.12 03:14:24 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 03:14:25 - OpenVPN > VERIFY KU OK

. 2018.03.12 03:14:25 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 03:14:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 03:14:25 - OpenVPN > VERIFY EKU OK

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 04:14:25 - Renewing TLS key

. 2018.03.12 04:14:25 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 04:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4289468/-1 pkts=17966/0

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 04:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 04:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 04:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 05:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4133956/-1 pkts=17253/0

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 05:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 05:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 05:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 06:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4318074/-1 pkts=17867/0

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 06:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 06:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 06:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4527903/-1 pkts=18303/0

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:28:58 - Cannot retrieve systems & servers data. (Length of the data to decrypt is invalid. - Status: HTTP/1.1 502 Bad Gateway - Headers: server:nginx;date:Mon, 12 Mar 2018 09:04:47 GMT;content-type:text/html;content-length:1533;connection:keep-alive;etag:"5364e4bd-5fd"; - Body (1533 bytes): <!DOCTYPE HTML>

. 2018.03.12 07:28:58 -     <html>

. 2018.03.12 07:28:58 -     <body style="background-color:#EEEEEE;padding:0px;margin:0px;font-size:1.3em;font-family:Verdana,Arial;">

. 2018.03.12 07:28:58 -     <div style="height:80px; background-color: #5F7DAB; background-image: url('/error/header_gradient.png');background-repeat: repeat-x; font-size:1.0em">

. 2018.03.12 07:28:58 -     <img style="vertical-align: middle;" src="/error/header.png">

. 2018.03.12 07:28:58 -     <div style="float:right;padding-right:30px;padding-top:20px;color:white;font-size:1.5em;">We're sorry, our tubes are clogged up.</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <div style="clear:both;text-align:center;">

. 2018.03.12 07:28:58 -     <div style="margin:auto;padding:50px;width:900px;background-color:white;box-shadow: 0 0 20px #888;">

. 2018.03.12 07:28:58 -     <div style="float:right;margin:5px;width:400px;">

. 2018.03.12 07:28:58 -     <a class="twitter-timeline"  href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn" data-widget-id="259385580377481216">Tweets di @airvpn</a>

. 2018.03.12 07:28:58 -     <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="/external_image/?url=https%3A%2F%2Fplatform.twitter.com%2Fwidgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <p></p>

. 2018.03.12 07:28:58 -     <p>We're sorry, our tubes are clogged up.</p>

. 2018.03.12 07:28:58 -     <p>We're working to deliver more tubes on a bigger truck and solve the problem.</p>

. 2018.03.12 07:28:58 -     <p>Please see <a href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn">https://twitter.com/airvpn</a> for information and updates in the meantime.</p>

. 2018.03.12 07:28:58 -     <img style="margin-top:100px;" src="/error/tubes.jpg">

. 2018.03.12 07:28:58 -     <div style="clear:both;font-size:0.4em;margin-top:50px;color:gray">Backend LU</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </body>

. 2018.03.12 07:28:58 -     </html> )

. 2018.03.12 07:30:00 - Updating systems & servers data ...

. 2018.03.12 07:30:02 - Systems & servers data update completed

. 2018.03.12 07:40:15 - Updating systems & servers data ...

. 2018.03.12 07:40:17 - Systems & servers data update completed

. 2018.03.12 07:50:26 - Updating systems & servers data ...

. 2018.03.12 07:50:28 - Systems & servers data update completed

. 2018.03.12 07:58:35 - macOS - PF rules updated, reloading

! 2018.03.12 07:58:36 - Disconnecting

. 2018.03.12 07:58:37 - Routes, removed a route previously added, 71.19.252.114 for gateway 10.4.0.1

. 2018.03.12 07:58:37 - Sending management termination signal

. 2018.03.12 07:58:37 - Management - Send 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:42 - OpenVPN > delete net 71.19.252.113: gateway 192.168.1.254

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > Closing TUN/TAP interface

. 2018.03.12 07:58:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.12 07:58:42 - Connection terminated.

. 2018.03.12 07:58:45 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Ethernet)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (FireWire)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.03.12 07:58:49 - Checking authorization ...

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (FireWire)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.03.12 07:58:51 - Connecting to Aquila (United States, Fremont, California)

. 2018.03.12 07:58:51 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.12 07:58:51 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.12 07:58:51 - Connection to OpenVPN Management Interface

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.03.12 07:58:51 - OpenVPN > UDP link local: (not bound)

. 2018.03.12 07:58:51 - OpenVPN > UDP link remote: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.223.129:443, sid=a0b4f7a6 ec046c0e

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:58:51 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:58:51 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:58:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:58:51 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 07:58:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:58:52 - OpenVPN > [Aquila] Peer Connection Initiated with [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:53 - OpenVPN > SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1)

. 2018.03.12 07:58:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.157 255.255.0.0,peer-id 26,cipher AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.12 07:58:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.03.12 07:58:53 - OpenVPN > Opened utun device utun0

. 2018.03.12 07:58:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.03.12 07:58:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.12 07:58:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 10.4.2.157 10.4.2.157 netmask 255.255.0.0 mtu 1500 up

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.157 255.255.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.157

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 199.249.223.129 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:53 - OpenVPN > add net 199.249.223.129: gateway 192.168.1.254

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - Routes, added a new route, 199.249.223.130 for gateway 10.4.0.1

. 2018.03.12 07:58:54 - Flushing DNS

. 2018.03.12 07:58:54 - macOS - PF rules updated, reloading

I 2018.03.12 07:58:55 - Checking route IPv4

I 2018.03.12 07:58:56 - Checking DNS

! 2018.03.12 07:58:57 - Connected.

. 2018.03.12 07:58:57 - OpenVPN > Initialization Sequence Completed

. 2018.03.12 08:00:39 - Updating systems & servers data ...

. 2018.03.12 08:00:42 - Systems & servers data update completed

. 2018.03.12 08:10:55 - Updating systems & servers data ...

. 2018.03.12 08:10:57 - Systems & servers data update completed

. 2018.03.12 08:21:10 - Updating systems & servers data ...

. 2018.03.12 08:21:13 - Systems & servers data update completed

. 2018.03.12 08:31:20 - Updating systems & servers data ...

. 2018.03.12 08:31:23 - Systems & servers data update completed

. 2018.03.12 08:41:30 - Updating systems & servers data ...

. 2018.03.12 08:41:33 - Systems & servers data update completed

. 2018.03.12 08:51:39 - Updating systems & servers data ...

. 2018.03.12 08:51:42 - Systems & servers data update completed

. 2018.03.12 08:58:52 - OpenVPN > TLS: soft reset sec=0 bytes=3450446668/-1 pkts=4929422/0

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 08:58:52 - OpenVPN > VERIFY KU OK

. 2018.03.12 08:58:52 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 08:58:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 08:58:52 - OpenVPN > VERIFY EKU OK

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 08:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 09:01:46 - Updating systems & servers data ...

. 2018.03.12 09:01:51 - Systems & servers data update completed

. 2018.03.12 09:11:55 - Updating systems & servers data ...

. 2018.03.12 09:12:05 - Systems & servers data update completed

. 2018.03.12 09:22:20 - Updating systems & servers data ...

. 2018.03.12 09:22:28 - Systems & servers data update completed

. 2018.03.12 09:32:35 - Updating systems & servers data ...

. 2018.03.12 09:32:37 - Systems & servers data update completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "108",

            "use": "1",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "621",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "10.0.0.4\/16",

            "gateway": "10.4.2.157",

            "flags": "UGSc",

            "refs": "3",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "10.4.2.157",

            "gateway": "10.4.2.157",

            "flags": "UH",

            "refs": "2",

            "use": "904",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "3",

            "use": "943294",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "83",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLWI",

            "refs": "0",

            "use": "1126",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "1c:af:f7:d9:72:db",

            "flags": "UHLWIir",

            "refs": "5",

            "use": "5840",

            "mtu": "1500",

            "interface": "en0",

            "expire": "1191"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "18",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "199.249.223.129",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "199.249.223.130",

            "gateway": "10.4.0.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "806",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "224.0.0.0",

            "gateway": "link#4",

            "flags": "UmCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.1",

            "gateway": "1:0:5e:0:0:1",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "56846",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "::1",

                "127.0.0.1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "192.168.1.65"

            ],

            "gateways": [

                "192.168.1.254"

            ],

            "bind": true

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "10.4.2.157"

            ],

            "gateways": [

                "10.4.0.1",

                "10.4.2.157"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en0"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=3<RXCSUM,TXCSUM>

    inet6 ::1 prefixlen 128

    inet 127.0.0.1 netmask 0xff000000

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=1<PERFORMNUD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>

    ether 00:23:df:8c:a0:ae

    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=1<PERFORMNUD>

    media: autoselect (100baseTX <full-duplex,flow-control>)

    status: active

en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500

    ether 00:1f:f3:bd:82:25

    nd6 options=1<PERFORMNUD>

    media: autoselect (<unknown type>)

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr 00:23:df:ff:fe:8c:a0:ae

    nd6 options=1<PERFORMNUD>

    media: autoselect <full-duplex>

    status: inactive

p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304

    ether 02:1f:f3:bd:82:25

    media: autoselect

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.4.2.157 --> 10.4.2.157 netmask 0xffff0000

Share this post


Link to post

I'm using Eddie 2.14.2 beta on Ubuntu 17.10 and I repeatedly encounter the following errors:

 

1.  It runs well as long as I don't minimize it: when I do, it invariably crashes, and leaves the process eddie_tray running which I cannot end, close, or kill: the only way to get rid of the process is to reboot.  As long as it is running I am unable to open Eddie again, as it informs me that it is already running.  This is reproducible every time I try it.

 

2.  If I try to go to the AirVPN webpage from within Eddie (hitting the AirVPN button then choosing Website from the menu), Eddie completely freezes.  The menu stays open but I can not choose any items, nor can I close Eddie - or anything else - in any manner.  I cannot open anything, either: the desktop completely locks up.  I can move the mouse cursor, but cannot interact with the desktop in any way: the only way out is to press the power button on the computer and shut it down.  This is mostly reproducible, but I can't be sure it happens 100% of the time.  (I can, however, reach the AirVPN website quite easily if I just don't try to get to it through Eddie.)

Share this post


Link to post

Hi Grindle222,

​To at least save a reboot, you can try killing mono and openvpn. If that doesn't work, the parent of eddie_tray is 'su' so you can also see if killing that helps.

​Cheers

Share this post


Link to post

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

Share this post


Link to post

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

 

Have you tried the portable mono version? This one works flawlessly for me in Arch Linux and it's wicked fast, much faster than the ppa version that I used in Ubuntu 16.04. The non-mono portable version on the other hand is slow as hell. I haven't tested the AUR version yet.

Share this post


Link to post

Greetings,

 

I'm running the Eddie beta (2.14.2) with Network Lock activated on a MacOS laptop (10.13.3), which I do have to close / put to sleep regularly.  Eddie sometimes has an issue reconnecting when I wake the laptop from it's slumbers.  It doesn't happen every time I wake the machine, but it does happen fairly often.

 

Here are some log entries that I grabbed recently when Eddie was unable to complete his IPv4 checks and finish connecting after I woke the laptop. Eddie seems to try about 3 times to reconnect and then disconnects and tries again, often still unsuccessfully.

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml
. 2018.03.22 07:38:30 - Command line arguments (0):
. 2018.03.22 07:38:32 - OpenVPN Driver - Expected
. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)
. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)
. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
W 2018.03.22 07:38:33 - Recovery. Unexpected crash?
. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1
! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
. 2018.03.22 07:38:33 - Updating systems & servers data ...
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:33 - Session starting.
. 2018.03.22 07:38:34 - Systems & servers data update completed
I 2018.03.22 07:38:39 - Checking authorization ...
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)
. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK
. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 07:38:42 - Above log line repeated 1 times more
. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2
. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 07:38:43 - Flushing DNS
. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:43 - Checking route IPv4
I 2018.03.22 07:38:44 - Checking DNS
! 2018.03.22 07:38:44 - Connected.
. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 07:48:40 - Updating systems & servers data ...
. 2018.03.22 07:48:42 - Systems & servers data update completed
. 2018.03.22 08:01:23 - Updating systems & servers data ...
. 2018.03.22 08:01:27 - Systems & servers data update completed
. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading
! 2018.03.22 10:01:37 - Disconnecting
. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 10:01:37 - Sending management termination signal
. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 10:01:37 - Connection terminated.
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.22 10:01:45 - Checking authorization ...
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK
. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'
. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 10:01:48 - Above log line repeated 1 times more
. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2
. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 10:01:49 - Flushing DNS
. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading
I 2018.03.22 10:01:50 - Checking route IPv4
I 2018.03.22 10:01:50 - Checking DNS
! 2018.03.22 10:01:50 - Connected.
. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading
! 2018.03.22 12:01:40 - Disconnecting
. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 12:01:40 - Sending management termination signal
. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 12:01:40 - Connection terminated.
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 12:01:41 - Updating systems & servers data ...
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2018.03.22 12:01:41 - Systems & servers data update completed
I 2018.03.22 12:01:46 - Checking authorization ...
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)
. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK
. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'
. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 12:01:51 - Above log line repeated 1 times more
. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2
. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.22 12:01:52 - Flushing DNS
. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading
I 2018.03.22 12:01:53 - Checking route IPv4
I 2018.03.22 12:01:53 - Checking DNS
! 2018.03.22 12:01:53 - Connected.
. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed
. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading
! 2018.03.24 07:51:56 - Disconnecting
. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.24 07:51:56 - Sending management termination signal
. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.24 07:51:56 - Connection terminated.
. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:00 - Checking authorization ...
W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)
. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:03 - Above log line repeated 1 times more
. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:04 - Flushing DNS
. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading
I 2018.03.24 07:52:05 - Checking route IPv4
I 2018.03.24 07:52:05 - Checking DNS
. 2018.03.24 07:52:06 - Checking DNS failed:
. 2018.03.24 07:52:06 - Checking DNS (2° try)
. 2018.03.24 07:52:07 - Checking DNS failed:
. 2018.03.24 07:52:07 - Checking DNS (3° try)
. 2018.03.24 07:52:10 - Checking DNS failed:
E 2018.03.24 07:52:10 - Checking DNS failed.
. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:52:10 - Disconnecting
. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:10 - Sending management termination signal
. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:52:13 - Updating systems & servers data ...
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:52:15 - Connection terminated.
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:19 - Checking authorization ...
. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)
. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:22 - Above log line repeated 1 times more
. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:52:23 - Flushing DNS
I 2018.03.24 07:52:23 - Checking route IPv4
. 2018.03.24 07:52:34 - Systems & servers data update completed
. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.03.24 07:52:43 - Checking route (2° try)
. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds
. 2018.03.24 07:53:04 - Checking route (3° try)
. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds
E 2018.03.24 07:53:26 - Checking route IPv4 failed.
. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:53:26 - Disconnecting
. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:53:26 - Sending management termination signal
. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:53:31 - Connection terminated.
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:53:35 - Checking authorization ...
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'
. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:53:38 - Above log line repeated 1 times more
. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1
. 2018.03.24 07:53:39 - Flushing DNS
I 2018.03.24 07:53:39 - Checking route IPv4
. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:53:59 - Checking route (2° try)

 

I've tried hitting "Cancel" on the main Eddie window, refreshing the servers list on the Servers tab, and then reconnecting to a recommended server.  This usually doesn't work either and results in the same issue with checking the IPv4 route.  Here's a batch of log entries from one of those attempts (cancel, refresh servers list, reconnect to recommended server).

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml
. 2018.03.22 07:38:30 - Command line arguments (0):
. 2018.03.22 07:38:32 - OpenVPN Driver - Expected
. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)
. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)
. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
W 2018.03.22 07:38:33 - Recovery. Unexpected crash?
. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1
! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
. 2018.03.22 07:38:33 - Updating systems & servers data ...
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:33 - Session starting.
. 2018.03.22 07:38:34 - Systems & servers data update completed
I 2018.03.22 07:38:39 - Checking authorization ...
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)
. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK
. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 07:38:42 - Above log line repeated 1 times more
. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2
. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 07:38:43 - Flushing DNS
. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:43 - Checking route IPv4
I 2018.03.22 07:38:44 - Checking DNS
! 2018.03.22 07:38:44 - Connected.
. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 07:48:40 - Updating systems & servers data ...
. 2018.03.22 07:48:42 - Systems & servers data update completed
. 2018.03.22 08:01:23 - Updating systems & servers data ...
. 2018.03.22 08:01:27 - Systems & servers data update completed
. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading
! 2018.03.22 10:01:37 - Disconnecting
. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 10:01:37 - Sending management termination signal
. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 10:01:37 - Connection terminated.
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.22 10:01:45 - Checking authorization ...
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK
. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'
. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 10:01:48 - Above log line repeated 1 times more
. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2
. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 10:01:49 - Flushing DNS
. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading
I 2018.03.22 10:01:50 - Checking route IPv4
I 2018.03.22 10:01:50 - Checking DNS
! 2018.03.22 10:01:50 - Connected.
. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading
! 2018.03.22 12:01:40 - Disconnecting
. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 12:01:40 - Sending management termination signal
. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 12:01:40 - Connection terminated.
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 12:01:41 - Updating systems & servers data ...
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2018.03.22 12:01:41 - Systems & servers data update completed
I 2018.03.22 12:01:46 - Checking authorization ...
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)
. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK
. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'
. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 12:01:51 - Above log line repeated 1 times more
. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2
. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.22 12:01:52 - Flushing DNS
. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading
I 2018.03.22 12:01:53 - Checking route IPv4
I 2018.03.22 12:01:53 - Checking DNS
! 2018.03.22 12:01:53 - Connected.
. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed
. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading
! 2018.03.24 07:51:56 - Disconnecting
. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.24 07:51:56 - Sending management termination signal
. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.24 07:51:56 - Connection terminated.
. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:00 - Checking authorization ...
W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)
. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:03 - Above log line repeated 1 times more
. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:04 - Flushing DNS
. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading
I 2018.03.24 07:52:05 - Checking route IPv4
I 2018.03.24 07:52:05 - Checking DNS
. 2018.03.24 07:52:06 - Checking DNS failed:
. 2018.03.24 07:52:06 - Checking DNS (2° try)
. 2018.03.24 07:52:07 - Checking DNS failed:
. 2018.03.24 07:52:07 - Checking DNS (3° try)
. 2018.03.24 07:52:10 - Checking DNS failed:
E 2018.03.24 07:52:10 - Checking DNS failed.
. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:52:10 - Disconnecting
. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:10 - Sending management termination signal
. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:52:13 - Updating systems & servers data ...
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:52:15 - Connection terminated.
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:19 - Checking authorization ...
. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)
. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:22 - Above log line repeated 1 times more
. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:52:23 - Flushing DNS
I 2018.03.24 07:52:23 - Checking route IPv4
. 2018.03.24 07:52:34 - Systems & servers data update completed
. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.03.24 07:52:43 - Checking route (2° try)
. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds
. 2018.03.24 07:53:04 - Checking route (3° try)
. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds
E 2018.03.24 07:53:26 - Checking route IPv4 failed.
. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:53:26 - Disconnecting
. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:53:26 - Sending management termination signal
. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:53:31 - Connection terminated.
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:53:35 - Checking authorization ...
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'
. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:53:38 - Above log line repeated 1 times more
. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1
. 2018.03.24 07:53:39 - Flushing DNS
I 2018.03.24 07:53:39 - Checking route IPv4
. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:53:59 - Checking route (2° try)
. 2018.03.24 07:54:20 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:54:20 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:54:20 - Disconnecting
. 2018.03.24 07:54:20 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.4.0.1
. 2018.03.24 07:54:20 - Sending management termination signal
. 2018.03.24 07:54:20 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 184.75.221.210 192.168.50.1 255.255.255.255
. 2018.03.24 07:54:25 - OpenVPN > delete net 184.75.221.210: gateway 192.168.50.1
. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:25 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:25 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:25 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:54:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:54:25 - Connection terminated.
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2018.03.24 07:54:26 - Flushing DNS
I 2018.03.24 07:54:26 - Session terminated.
. 2018.03.24 07:54:30 - Updating systems & servers data ...
E 2018.03.24 07:54:31 - Object reference not set to an instance of an object
. 2018.03.24 07:54:31 - Systems & servers data update completed
I 2018.03.24 07:54:39 - Session starting.
I 2018.03.24 07:54:39 - Checking authorization ...
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:54:41 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2018.03.24 07:54:41 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:54:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:54:41 - Connection to OpenVPN Management Interface
. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:54:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:54:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:54:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.202:443
. 2018.03.24 07:54:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:54:41 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:54:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.202:443
. 2018.03.24 07:54:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=130e2fa4 7830b1a5
. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:54:41 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:54:41 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:54:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:54:41 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2018.03.24 07:54:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:54:41 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443
. 2018.03.24 07:54:42 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:54:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.163 255.255.0.0,peer-id 5,cipher AES-256-GCM'
. 2018.03.24 07:54:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:54:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:54:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:54:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:54:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:54:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:54:42 - Above log line repeated 1 times more
. 2018.03.24 07:54:42 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:54:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:54:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:54:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.163 10.4.1.163 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.163 255.255.0.0
. 2018.03.24 07:54:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.163
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 184.75.221.202 192.168.50.1 255.255.255.255
. 2018.03.24 07:54:42 - OpenVPN > add net 184.75.221.202: gateway 192.168.50.1
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - Routes, added a new route, 184.75.221.203 for gateway 10.4.0.1
. 2018.03.24 07:54:43 - Flushing DNS
I 2018.03.24 07:54:43 - Checking route IPv4
. 2018.03.24 07:55:03 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:55:03 - Checking route (2° try)
. 2018.03.24 07:55:25 - curl: (28) Connection timed out after 20002 milliseconds
. 2018.03.24 07:55:25 - Checking route (3° try)
. 2018.03.24 07:55:47 - curl: (28) Connection timed out after 20000 milliseconds
E 2018.03.24 07:55:47 - Checking route IPv4 failed.
. 2018.03.24 07:55:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:55:47 - Disconnecting
. 2018.03.24 07:55:47 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.4.0.1
. 2018.03.24 07:55:47 - Sending management termination signal
. 2018.03.24 07:55:47 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:55:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:55:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 184.75.221.202 192.168.50.1 255.255.255.255
. 2018.03.24 07:55:52 - OpenVPN > delete net 184.75.221.202: gateway 192.168.50.1
. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:52 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:55:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:55:52 - Connection terminated.
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:55:56 - Checking authorization ...
. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:55:57 - Connecting to Alhena (Canada, Toronto, Ontario)
. 2018.03.24 07:55:57 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:55:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:55:57 - Connection to OpenVPN Management Interface
. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:55:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443
. 2018.03.24 07:55:57 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:55:57 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:55:57 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443
. 2018.03.24 07:55:57 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=90b230f1 b154ba27
. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:55:57 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:55:57 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:55:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:55:57 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:55:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:55:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443
. 2018.03.24 07:55:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:55:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.147 255.255.0.0'
. 2018.03.24 07:55:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:59 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:55:59 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:55:59 - Above log line repeated 1 times more
. 2018.03.24 07:55:59 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:55:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:55:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:55:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 10.4.21.147 10.4.21.147 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.147 255.255.0.0
. 2018.03.24 07:55:59 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.147
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 162.219.176.2 192.168.50.1 255.255.255.255
. 2018.03.24 07:55:59 - OpenVPN > add net 162.219.176.2: gateway 192.168.50.1
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:59 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:59 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:59 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:55:59 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - Routes, added a new route, 162.219.176.3 for gateway 10.4.0.1
. 2018.03.24 07:56:00 - Flushing DNS
I 2018.03.24 07:56:00 - Checking route IPv4
. 2018.03.24 07:56:20 - curl: (28) Connection timed out after 20000 milliseconds
. 2018.03.24 07:56:20 - Checking route (2° try)

 

The solution in the moment is to hit "Cancel" and then completely shut down and restart Eddie.  He's much happier to connect to a reocmmended server after that.

 

Just wanted to pass this along in case it's relevant to the beta or in case there's something obvious that I can to change my setup a bit and smooth out the reconnecting process.

 

Thanks!

Share this post


Link to post

Greetings,

 

I'm running the Eddie beta (2.14.2) with Network Lock activated on a MacOS laptop (10.13.3), which I do have to close / put to sleep regularly.  Eddie sometimes has an issue reconnecting when I wake the laptop from it's slumbers.  It doesn't happen every time I wake the machine, but it does happen fairly often.

 

Here are some log entries that I grabbed recently when Eddie was unable to complete his IPv4 checks and finish connecting after I woke the laptop. Eddie seems to try about 3 times to reconnect and then disconnects and tries again, often still unsuccessfully.

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

 

I've tried hitting "Cancel" on the main Eddie window, refreshing the servers list on the Servers tab, and then reconnecting to a recommended server.  This usually doesn't work either and results in the same issue with checking the IPv4 route.  Here's a batch of log entries from one of those attempts (cancel, refresh servers list, reconnect to recommended server).

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

. 2018.03.24 07:54:20 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:54:20 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:54:20 - Disconnecting

. 2018.03.24 07:54:20 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:54:20 - Sending management termination signal

. 2018.03.24 07:54:20 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:25 - OpenVPN > delete net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:54:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:54:25 - Connection terminated.

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.24 07:54:26 - Flushing DNS

I 2018.03.24 07:54:26 - Session terminated.

. 2018.03.24 07:54:30 - Updating systems & servers data ...

E 2018.03.24 07:54:31 - Object reference not set to an instance of an object

. 2018.03.24 07:54:31 - Systems & servers data update completed

I 2018.03.24 07:54:39 - Session starting.

I 2018.03.24 07:54:39 - Checking authorization ...

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:54:41 - Connecting to Alkurhah (Canada, Toronto, Ontario)

. 2018.03.24 07:54:41 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:54:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:54:41 - Connection to OpenVPN Management Interface

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:54:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:54:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=130e2fa4 7830b1a5

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:54:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:54:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:54:41 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:54:41 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:42 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:54:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.163 255.255.0.0,peer-id 5,cipher AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:54:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:54:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:54:42 - Above log line repeated 1 times more

. 2018.03.24 07:54:42 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:54:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:54:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:54:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.163 10.4.1.163 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.163 255.255.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.163

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:42 - OpenVPN > add net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - Routes, added a new route, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:54:43 - Flushing DNS

I 2018.03.24 07:54:43 - Checking route IPv4

. 2018.03.24 07:55:03 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:55:03 - Checking route (2° try)

. 2018.03.24 07:55:25 - curl: (28) Connection timed out after 20002 milliseconds

. 2018.03.24 07:55:25 - Checking route (3° try)

. 2018.03.24 07:55:47 - curl: (28) Connection timed out after 20000 milliseconds

E 2018.03.24 07:55:47 - Checking route IPv4 failed.

. 2018.03.24 07:55:47 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:55:47 - Disconnecting

. 2018.03.24 07:55:47 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:55:47 - Sending management termination signal

. 2018.03.24 07:55:47 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:52 - OpenVPN > delete net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:55:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:55:52 - Connection terminated.

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:55:56 - Checking authorization ...

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:55:57 - Connecting to Alhena (Canada, Toronto, Ontario)

. 2018.03.24 07:55:57 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:55:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:55:57 - Connection to OpenVPN Management Interface

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:55:57 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:55:57 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=90b230f1 b154ba27

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:55:57 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:55:57 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:55:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:55:57 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:55:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:55:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:55:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.147 255.255.0.0'

. 2018.03.24 07:55:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:55:59 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:55:59 - Above log line repeated 1 times more

. 2018.03.24 07:55:59 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:55:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:55:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:55:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 10.4.21.147 10.4.21.147 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.147 255.255.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.147

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 162.219.176.2 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:59 - OpenVPN > add net 162.219.176.2: gateway 192.168.50.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:55:59 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - Routes, added a new route, 162.219.176.3 for gateway 10.4.0.1

. 2018.03.24 07:56:00 - Flushing DNS

I 2018.03.24 07:56:00 - Checking route IPv4

. 2018.03.24 07:56:20 - curl: (28) Connection timed out after 20000 milliseconds

. 2018.03.24 07:56:20 - Checking route (2° try)

 

The solution in the moment is to hit "Cancel" and then completely shut down and restart Eddie.  He's much happier to connect to a reocmmended server after that.

 

Just wanted to pass this along in case it's relevant to the beta or in case there's something obvious that I can to change my setup a bit and smooth out the reconnecting process.

 

Thanks!

Great post. Please try going to Eddies preferences and unchecking "Check Air DNS" and "Check if Air Tunnel works" and then connect to a different location .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hey LZ1,

 

Thanks much for the prompt advice!  I made those changes not long after you posted them and reconnected.  I've been letting Eddie (and the laptop) run as usual since, to see how things go.  So far, Eddie has reconnected much smoother after waking the laptop from sleep.  Those changes seem to have helped.  It is kosher to leave those settings in place then?  Or is this temporary fix with something else needed later on?

 

Thanks much for the help!

Share this post


Link to post

Hey LZ1,

 

Thanks much for the prompt advice!  I made those changes not long after you posted them and reconnected.  I've been letting Eddie (and the laptop) run as usual since, to see how things go.  So far, Eddie has reconnected much smoother after waking the laptop from sleep.  Those changes seem to have helped.  It is kosher to leave those settings in place then?  Or is this temporary fix with something else needed later on?

 

Thanks much for the help!

No worries, glad to be of assistance .

 

It's more ideal they're enabled and you can always try enable them afterwards, but when this issue occurs, it's a "quick fix". You can check here.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

 

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

 

Have you tried the portable mono version? This one works flawlessly for me in Arch Linux and it's wicked fast, much faster than the ppa version that I used in Ubuntu 16.04. The non-mono portable version on the other hand is slow as hell. I haven't tested the AUR version yet.

 

No such luck I can't get the portable mono version to run on my system at all, unhandled exception everytime.

Share this post


Link to post

 

 

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

 

Have you tried the portable mono version? This one works flawlessly for me in Arch Linux and it's wicked fast, much faster than the ppa version that I used in Ubuntu 16.04. The non-mono portable version on the other hand is slow as hell. I haven't tested the AUR version yet.

 

No such luck I can't get the portable mono version to run on my system at all, unhandled exception everytime.

Perhaps you could share some details about that exception?


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Perhaps you could share some details about that exception?

 

Assuming I'm not doing the wrong thing running Eddie-UI.exe under mono, I get this message everytime with the latest portable-mono from the site.

 

Unhandled Exception:

System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

[ERROR] FATAL UNHANDLED EXCEPTION: System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

Share this post


Link to post

 

Perhaps you could share some details about that exception?

 

Assuming I'm not doing the wrong thing running Eddie-UI.exe under mono, I get this message everytime with the latest portable-mono from the site.

 

Unhandled Exception:

System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

[ERROR] FATAL UNHANDLED EXCEPTION: System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

 

Ah that. Please look here, as it seems to be the same. It's not particularly helpful, but at least you're not the only one.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Ah that. Please look here, as it seems to be the same. It's not particularly helpful, but at least you're not the only one.

 

Yeah I was just reading through a few of these threads in the other forum and can now get them opening thanks to this fix but no chance of logging in, just hangs at 'logout...' for now

 

The very short log

 

 

. 2018.03.29 20:29:19 - Eddie version: 2.14.2 / linux_x64, System: Linux, Name: Arch Linux \r (\l), Version: Linux cinnabar 4.15.13-1-ARCH #1 SMP PREEMPT Sun Mar 25 11:27:57 UTC 2018 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319

. 2018.03.29 20:29:19 - Reading options from /opt/eddie/AirVPN.xml

. 2018.03.29 20:29:19 - Command line arguments (1): console.mode="none"

. 2018.03.29 20:29:20 - OpenVPN Driver - Found, /dev/net/tun

. 2018.03.29 20:29:20 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2n  7 Dec 2017, LZO 2.10 (/opt/eddie/openvpn)

. 2018.03.29 20:29:20 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0g  2 Nov 2017 (/usr/bin/ssh)

. 2018.03.29 20:29:20 - SSL - Version: stunnel 5.40 (/opt/eddie/stunnel)

. 2018.03.29 20:29:20 - curl - Version: 7.59.0 (/usr/bin/curl)

. 2018.03.29 20:29:20 - Certification Authorities: /opt/eddie/res//cacert.pem

 

Guess I'll be sticking with 2.13.6 for a bit longer

Share this post


Link to post

I have eddie on autostart and through all versions appears the same "problem":

 

It connects EVERY TIME automatically to mirach (i have only NL whitelisted), if i blacklist mirach it connects always to the next one in list "Merga"... thats really annoying... i just want it to connect always to the one with lowest latency or in my case to the one with lowest bandwith usage, cause i have set it to "speed" below.

 

Why is that?

Share this post


Link to post

I have eddie on autostart and through all versions appears the same "problem":

 

It connects EVERY TIME automatically to mirach (i have only NL whitelisted), if i blacklist mirach it connects always to the next one in list "Merga"... thats really annoying... i just want it to connect always to the one with lowest latency or in my case to the one with lowest bandwith usage, cause i have set it to "speed" below.

 

Why is that?

Staff did mention making the auto-selection more intelligent in the future, but I can't find the post for you at this moment sorry.  Otherwise there's the usual FAQ on how Eddie selects. I don't think setting the scoring rule to speed makes any difference, as that's only for how things are ordered in the list.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

 

Greetings,

 

I'm running the Eddie beta (2.14.2) with Network Lock activated on a MacOS laptop (10.13.3), which I do have to close / put to sleep regularly.  Eddie sometimes has an issue reconnecting when I wake the laptop from it's slumbers.  It doesn't happen every time I wake the machine, but it does happen fairly often.

 

Here are some log entries that I grabbed recently when Eddie was unable to complete his IPv4 checks and finish connecting after I woke the laptop. Eddie seems to try about 3 times to reconnect and then disconnects and tries again, often still unsuccessfully.

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

 

I've tried hitting "Cancel" on the main Eddie window, refreshing the servers list on the Servers tab, and then reconnecting to a recommended server.  This usually doesn't work either and results in the same issue with checking the IPv4 route.  Here's a batch of log entries from one of those attempts (cancel, refresh servers list, reconnect to recommended server).

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

. 2018.03.24 07:54:20 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:54:20 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:54:20 - Disconnecting

. 2018.03.24 07:54:20 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:54:20 - Sending management termination signal

. 2018.03.24 07:54:20 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:25 - OpenVPN > delete net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:54:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:54:25 - Connection terminated.

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.24 07:54:26 - Flushing DNS

I 2018.03.24 07:54:26 - Session terminated.

. 2018.03.24 07:54:30 - Updating systems & servers data ...

E 2018.03.24 07:54:31 - Object reference not set to an instance of an object

. 2018.03.24 07:54:31 - Systems & servers data update completed

I 2018.03.24 07:54:39 - Session starting.

I 2018.03.24 07:54:39 - Checking authorization ...

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:54:41 - Connecting to Alkurhah (Canada, Toronto, Ontario)

. 2018.03.24 07:54:41 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:54:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:54:41 - Connection to OpenVPN Management Interface

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:54:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:54:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=130e2fa4 7830b1a5

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:54:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:54:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:54:41 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:54:41 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:42 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:54:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.163 255.255.0.0,peer-id 5,cipher AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:54:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:54:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:54:42 - Above log line repeated 1 times more

. 2018.03.24 07:54:42 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:54:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:54:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:54:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.163 10.4.1.163 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.163 255.255.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.163

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:42 - OpenVPN > add net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - Routes, added a new route, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:54:43 - Flushing DNS

I 2018.03.24 07:54:43 - Checking route IPv4

. 2018.03.24 07:55:03 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:55:03 - Checking route (2° try)

. 2018.03.24 07:55:25 - curl: (28) Connection timed out after 20002 milliseconds

. 2018.03.24 07:55:25 - Checking route (3° try)

. 2018.03.24 07:55:47 - curl: (28) Connection timed out after 20000 milliseconds

E 2018.03.24 07:55:47 - Checking route IPv4 failed.

. 2018.03.24 07:55:47 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:55:47 - Disconnecting

. 2018.03.24 07:55:47 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:55:47 - Sending management termination signal

. 2018.03.24 07:55:47 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:52 - OpenVPN > delete net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:55:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:55:52 - Connection terminated.

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:55:56 - Checking authorization ...

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:55:57 - Connecting to Alhena (Canada, Toronto, Ontario)

. 2018.03.24 07:55:57 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:55:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:55:57 - Connection to OpenVPN Management Interface

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:55:57 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:55:57 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=90b230f1 b154ba27

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:55:57 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:55:57 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:55:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:55:57 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:55:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:55:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:55:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.147 255.255.0.0'

. 2018.03.24 07:55:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:55:59 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:55:59 - Above log line repeated 1 times more

. 2018.03.24 07:55:59 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:55:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:55:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:55:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 10.4.21.147 10.4.21.147 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.147 255.255.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.147

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 162.219.176.2 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:59 - OpenVPN > add net 162.219.176.2: gateway 192.168.50.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:55:59 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - Routes, added a new route, 162.219.176.3 for gateway 10.4.0.1

. 2018.03.24 07:56:00 - Flushing DNS

I 2018.03.24 07:56:00 - Checking route IPv4

. 2018.03.24 07:56:20 - curl: (28) Connection timed out after 20000 milliseconds

. 2018.03.24 07:56:20 - Checking route (2° try)

 

The solution in the moment is to hit "Cancel" and then completely shut down and restart Eddie.  He's much happier to connect to a reocmmended server after that.

 

Just wanted to pass this along in case it's relevant to the beta or in case there's something obvious that I can to change my setup a bit and smooth out the reconnecting process.

 

Thanks!

Great post. Please try going to Eddies preferences and unchecking "Check Air DNS" and "Check if Air Tunnel works" and then connect to a different location .

 

Im gonna have to try this now. I think he's describing the same problem Ive begun having just within the past month or so. Eddie randomly likes to drop connections, and then sits there choking on something to do with IPv4. It'll try to reconnect a few times (which seems to take forever to even disconnect and make it stop) and has to usually be closed and reopened a couple of times to get things back to normal again. It got to be an often enough problem that for the last couple of weeks I just went back to using Tunnelblick, but Ill give the beta another shot now.

Share this post


Link to post

 

 

Great post. Please try going to Eddies preferences and unchecking "Check Air DNS" and "Check if Air Tunnel works" and then connect to a different location .

Greetings,

 

I'm running the Eddie beta (2.14.2) with Network Lock activated on a MacOS laptop (10.13.3), which I do have to close / put to sleep regularly.  Eddie sometimes has an issue reconnecting when I wake the laptop from it's slumbers.  It doesn't happen every time I wake the machine, but it does happen fairly often.

 

Here are some log entries that I grabbed recently when Eddie was unable to complete his IPv4 checks and finish connecting after I woke the laptop. Eddie seems to try about 3 times to reconnect and then disconnects and tries again, often still unsuccessfully.

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

 

I've tried hitting "Cancel" on the main Eddie window, refreshing the servers list on the Servers tab, and then reconnecting to a recommended server.  This usually doesn't work either and results in the same issue with checking the IPv4 route.  Here's a batch of log entries from one of those attempts (cancel, refresh servers list, reconnect to recommended server).

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

. 2018.03.24 07:54:20 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:54:20 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:54:20 - Disconnecting

. 2018.03.24 07:54:20 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:54:20 - Sending management termination signal

. 2018.03.24 07:54:20 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:25 - OpenVPN > delete net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:54:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:54:25 - Connection terminated.

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.24 07:54:26 - Flushing DNS

I 2018.03.24 07:54:26 - Session terminated.

. 2018.03.24 07:54:30 - Updating systems & servers data ...

E 2018.03.24 07:54:31 - Object reference not set to an instance of an object

. 2018.03.24 07:54:31 - Systems & servers data update completed

I 2018.03.24 07:54:39 - Session starting.

I 2018.03.24 07:54:39 - Checking authorization ...

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:54:41 - Connecting to Alkurhah (Canada, Toronto, Ontario)

. 2018.03.24 07:54:41 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:54:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:54:41 - Connection to OpenVPN Management Interface

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:54:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:54:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=130e2fa4 7830b1a5

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:54:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:54:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:54:41 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:54:41 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:42 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:54:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.163 255.255.0.0,peer-id 5,cipher AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:54:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:54:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:54:42 - Above log line repeated 1 times more

. 2018.03.24 07:54:42 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:54:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:54:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:54:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.163 10.4.1.163 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.163 255.255.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.163

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:42 - OpenVPN > add net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - Routes, added a new route, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:54:43 - Flushing DNS

I 2018.03.24 07:54:43 - Checking route IPv4

. 2018.03.24 07:55:03 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:55:03 - Checking route (2° try)

. 2018.03.24 07:55:25 - curl: (28) Connection timed out after 20002 milliseconds

. 2018.03.24 07:55:25 - Checking route (3° try)

. 2018.03.24 07:55:47 - curl: (28) Connection timed out after 20000 milliseconds

E 2018.03.24 07:55:47 - Checking route IPv4 failed.

. 2018.03.24 07:55:47 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:55:47 - Disconnecting

. 2018.03.24 07:55:47 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:55:47 - Sending management termination signal

. 2018.03.24 07:55:47 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:52 - OpenVPN > delete net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:55:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:55:52 - Connection terminated.

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:55:56 - Checking authorization ...

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:55:57 - Connecting to Alhena (Canada, Toronto, Ontario)

. 2018.03.24 07:55:57 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:55:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:55:57 - Connection to OpenVPN Management Interface

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:55:57 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:55:57 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=90b230f1 b154ba27

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:55:57 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:55:57 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:55:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:55:57 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:55:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:55:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:55:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.147 255.255.0.0'

. 2018.03.24 07:55:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:55:59 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:55:59 - Above log line repeated 1 times more

. 2018.03.24 07:55:59 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:55:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:55:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:55:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 10.4.21.147 10.4.21.147 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.147 255.255.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.147

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 162.219.176.2 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:59 - OpenVPN > add net 162.219.176.2: gateway 192.168.50.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:55:59 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - Routes, added a new route, 162.219.176.3 for gateway 10.4.0.1

. 2018.03.24 07:56:00 - Flushing DNS

I 2018.03.24 07:56:00 - Checking route IPv4

. 2018.03.24 07:56:20 - curl: (28) Connection timed out after 20000 milliseconds

. 2018.03.24 07:56:20 - Checking route (2° try)

 

The solution in the moment is to hit "Cancel" and then completely shut down and restart Eddie.  He's much happier to connect to a reocmmended server after that.

 

Just wanted to pass this along in case it's relevant to the beta or in case there's something obvious that I can to change my setup a bit and smooth out the reconnecting process.

 

Thanks!

Im gonna have to try this now. I think he's describing the same problem Ive begun having just within the past month or so. Eddie randomly likes to drop connections, and then sits there choking on something to do with IPv4. It'll try to reconnect a few times (which seems to take forever to even disconnect and make it stop) and has to usually be closed and reopened a couple of times to get things back to normal again. It got to be an often enough problem that for the last couple of weeks I just went back to using Tunnelblick, but Ill give the beta another shot now.

That's quite possible, but do keep in mind that it's possible to experience the same error, but for different reasons. Therefore, it's usually best if you post supporting information as well . Best of luck though!


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Staff, following on from my last post, I was consequently blessed with more Windows errors.

 

Error: Windows WFP, unexpected: Rule 'ipv6_block_all' already exists

 

This issue is really really annoying because it clogs up the logs entirely and the logs thus supply ZERO useful information, besides the error itself. Location changes aren't shown, connection attempts aren't shown, nothing is shown unless it's a disconnection. It also actually kept connecting to the same location, despite my trying other ones. As you'll see in the logs, when the issue then goes away, it's substituted for netsh, protocol and other errors. But you may not see them, because the first error is spammed so much that Eddies log can't keep them all.

 

Small feature request:

  • Maybe logging to file should automatically be enabled in cases where Eddie registers a huge influx of errors, so logs aren't lost?
  • Could you consider adding a small confirmation dialogue to the Logs tab>Clear Logs button? Or greater spacing. As it's too easy to accidentally clear all logs when wanting to copy them .

 

System: Windows 8, with the 2.14.2 Eddie client.

 

I'm not entirely sure of the steps to reproduce but here you go:

 

1 - Run Eddie with NL on, after fixing WFP issue.(So TAP adapter is unmodified, besides for the IP6 box not being ticked in its properties).
2 - Make PC hibernate.
3 - Open Eddie and connect to recommended.
4 - Preferences>Networking>Layer IP6 set to "inside tunnel if supported, otherwise blocked" (default).

 

Issue will be created.

 

Options tried for Preferences>Networking>Layers> IP6:

  • - Block IP will continue the issue.
  • - "Outside tunnel" will fix it, in exchange for TUN waiting and other issues.
  • - "Inside, otherwise blocked" will continue the issue.
  • - "Inside if supported, otherwise outside" exchanges it for WFP Add rule issues.
  • - "Inside tunnel" will create netsh and WFP Add rule issues.

Things that were tried without success:

  • - Uninstalling TAP and letting Eddie install it.
  • - Turning off Network Lock.
  • - Changing Networking>Layer rules.
  • - Changing MS-specific options.
  • - Connecting to different locations. (Location changes do not show up or occur in logs during the error)
  • - Restoring Windows Firewall rules to default.
  • - Changing Network Lock modes.
  • - Unchecking Air DNS and check Air tunnel.

Current fix:

  • - Networking>Layer IP6> Must be "Inside tunnel if supported, otherwise OUTSIDE" and "Connection" set to IP4, IP6.

Logs:

 

E 2018.04.02 17:54:14 - OpenVPN > ERROR: netsh command failed: returned error code 1
. 2018.04.02 17:54:15 - Sending hard termination signal
. 2018.04.02 17:54:15 - Connection terminated.
W 2018.04.02 17:54:15 - The requested protocol has not been configured into the system or no implementation for it exists
I 2018.04.02 17:54:18 - Cancel requested.
I 2018.04.02 17:54:18 - Session terminated.
. 2018.04.02 17:54:43 - Cannot find tunnel adapter.
I 2018.04.02 17:54:52 - Session starting.
. 2018.04.02 17:54:52 - Cannot find tunnel adapter.
! 2018.04.02 17:54:52 - Installing tunnel driver
I 2018.04.02 17:55:02 - Checking authorization ...
W 2018.04.02 17:55:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:04 - Checking authorization ...
W 2018.04.02 17:55:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:04 - Checking authorization ...
W 2018.04.02 17:55:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:04 - Checking authorization ...
W 2018.04.02 17:55:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:05 - Checking authorization ...
W 2018.04.02 17:55:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:05 - Checking authorization ...
W 2018.04.02 17:55:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:06 - Checking authorization ...
W 2018.04.02 17:55:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:06 - Checking authorization ...
W 2018.04.02 17:55:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:07 - Checking authorization ...
W 2018.04.02 17:55:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:07 - Checking authorization ...
W 2018.04.02 17:55:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:08 - Checking authorization ...
W 2018.04.02 17:55:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:08 - Checking authorization ...
W 2018.04.02 17:55:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:09 - Checking authorization ...
W 2018.04.02 17:55:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:09 - Checking authorization ...
W 2018.04.02 17:55:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:10 - Checking authorization ...
W 2018.04.02 17:55:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:10 - Checking authorization ...
W 2018.04.02 17:55:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:11 - Checking authorization ...
W 2018.04.02 17:55:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:11 - Checking authorization ...
W 2018.04.02 17:55:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:12 - Checking authorization ...
W 2018.04.02 17:55:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:12 - Checking authorization ...
W 2018.04.02 17:55:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:13 - Checking authorization ...
W 2018.04.02 17:55:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:13 - Checking authorization ...
W 2018.04.02 17:55:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:14 - Checking authorization ...
W 2018.04.02 17:55:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:14 - Checking authorization ...
W 2018.04.02 17:55:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:15 - Checking authorization ...
W 2018.04.02 17:55:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:15 - Checking authorization ...
W 2018.04.02 17:55:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:16 - Checking authorization ...
W 2018.04.02 17:55:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:16 - Checking authorization ...
W 2018.04.02 17:55:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:17 - Checking authorization ...
W 2018.04.02 17:55:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:17 - Checking authorization ...
W 2018.04.02 17:55:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:18 - Checking authorization ...
W 2018.04.02 17:55:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:18 - Checking authorization ...
W 2018.04.02 17:55:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:19 - Checking authorization ...
W 2018.04.02 17:55:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:19 - Checking authorization ...
W 2018.04.02 17:55:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:20 - Checking authorization ...
W 2018.04.02 17:55:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:20 - Checking authorization ...
W 2018.04.02 17:55:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:21 - Checking authorization ...
W 2018.04.02 17:55:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:21 - Checking authorization ...
W 2018.04.02 17:55:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:22 - Checking authorization ...
W 2018.04.02 17:55:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:22 - Checking authorization ...
W 2018.04.02 17:55:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:23 - Checking authorization ...
W 2018.04.02 17:55:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:23 - Checking authorization ...
W 2018.04.02 17:55:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:24 - Checking authorization ...
W 2018.04.02 17:55:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:24 - Checking authorization ...
W 2018.04.02 17:55:25 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:25 - Checking authorization ...
W 2018.04.02 17:55:25 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:25 - Checking authorization ...
W 2018.04.02 17:55:25 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:25 - Checking authorization ...
W 2018.04.02 17:55:26 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:26 - Checking authorization ...
W 2018.04.02 17:55:26 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:26 - Checking authorization ...
W 2018.04.02 17:55:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:27 - Checking authorization ...
W 2018.04.02 17:55:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:27 - Checking authorization ...
W 2018.04.02 17:55:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:28 - Checking authorization ...
W 2018.04.02 17:55:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:28 - Checking authorization ...
W 2018.04.02 17:55:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:29 - Checking authorization ...
W 2018.04.02 17:55:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:29 - Checking authorization ...
W 2018.04.02 17:55:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:30 - Checking authorization ...
W 2018.04.02 17:55:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:30 - Checking authorization ...
W 2018.04.02 17:55:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:31 - Checking authorization ...
W 2018.04.02 17:55:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:31 - Checking authorization ...
W 2018.04.02 17:55:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:32 - Checking authorization ...
W 2018.04.02 17:55:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:32 - Checking authorization ...
W 2018.04.02 17:55:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:33 - Checking authorization ...
W 2018.04.02 17:55:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:33 - Checking authorization ...
W 2018.04.02 17:55:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:34 - Checking authorization ...
W 2018.04.02 17:55:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:34 - Checking authorization ...
W 2018.04.02 17:55:35 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:35 - Checking authorization ...
W 2018.04.02 17:55:35 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:35 - Checking authorization ...
W 2018.04.02 17:55:36 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:36 - Checking authorization ...
W 2018.04.02 17:55:36 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:36 - Checking authorization ...
W 2018.04.02 17:55:37 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:37 - Checking authorization ...
W 2018.04.02 17:55:37 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:37 - Checking authorization ...
W 2018.04.02 17:55:38 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:38 - Checking authorization ...
W 2018.04.02 17:55:38 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:38 - Checking authorization ...
W 2018.04.02 17:55:39 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:39 - Checking authorization ...
W 2018.04.02 17:55:39 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:39 - Checking authorization ...
W 2018.04.02 17:55:40 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:40 - Checking authorization ...
W 2018.04.02 17:55:40 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:40 - Checking authorization ...
W 2018.04.02 17:55:41 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:41 - Checking authorization ...
W 2018.04.02 17:55:41 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:41 - Checking authorization ...
W 2018.04.02 17:55:42 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:42 - Checking authorization ...
W 2018.04.02 17:55:42 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:42 - Checking authorization ...
W 2018.04.02 17:55:42 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:43 - Checking authorization ...
W 2018.04.02 17:55:43 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:43 - Checking authorization ...
W 2018.04.02 17:55:43 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:43 - Checking authorization ...
W 2018.04.02 17:55:44 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:44 - Checking authorization ...
W 2018.04.02 17:55:44 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:44 - Checking authorization ...
W 2018.04.02 17:55:45 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:45 - Checking authorization ...
W 2018.04.02 17:55:45 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:45 - Checking authorization ...
W 2018.04.02 17:55:46 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:46 - Checking authorization ...
W 2018.04.02 17:55:47 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:47 - Checking authorization ...
W 2018.04.02 17:55:47 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:47 - Checking authorization ...
W 2018.04.02 17:55:48 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:48 - Checking authorization ...
W 2018.04.02 17:55:48 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:48 - Checking authorization ...
W 2018.04.02 17:55:48 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:48 - Checking authorization ...
W 2018.04.02 17:55:49 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:49 - Checking authorization ...
W 2018.04.02 17:55:49 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:49 - Checking authorization ...
W 2018.04.02 17:55:50 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:50 - Checking authorization ...
W 2018.04.02 17:55:50 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:50 - Checking authorization ...
W 2018.04.02 17:55:51 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:51 - Checking authorization ...
W 2018.04.02 17:55:51 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:51 - Checking authorization ...
W 2018.04.02 17:55:52 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:52 - Checking authorization ...
W 2018.04.02 17:55:52 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:52 - Checking authorization ...
W 2018.04.02 17:55:53 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:53 - Checking authorization ...
W 2018.04.02 17:55:53 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:53 - Checking authorization ...
W 2018.04.02 17:55:54 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:54 - Checking authorization ...
W 2018.04.02 17:55:54 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:54 - Checking authorization ...
W 2018.04.02 17:55:55 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:55 - Checking authorization ...
W 2018.04.02 17:55:55 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:55 - Checking authorization ...
W 2018.04.02 17:55:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:56 - Checking authorization ...
W 2018.04.02 17:55:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:56 - Checking authorization ...
W 2018.04.02 17:55:57 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:57 - Checking authorization ...
W 2018.04.02 17:55:57 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:57 - Checking authorization ...
W 2018.04.02 17:55:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:58 - Checking authorization ...
W 2018.04.02 17:55:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:58 - Checking authorization ...
W 2018.04.02 17:55:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:55:59 - Checking authorization ...
W 2018.04.02 17:55:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:00 - Checking authorization ...
W 2018.04.02 17:56:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:00 - Checking authorization ...
W 2018.04.02 17:56:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:01 - Checking authorization ...
W 2018.04.02 17:56:01 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:01 - Checking authorization ...
W 2018.04.02 17:56:02 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:02 - Checking authorization ...
W 2018.04.02 17:56:02 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:02 - Checking authorization ...
W 2018.04.02 17:56:03 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:03 - Checking authorization ...
W 2018.04.02 17:56:03 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:03 - Checking authorization ...
W 2018.04.02 17:56:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:04 - Checking authorization ...
W 2018.04.02 17:56:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:04 - Checking authorization ...
W 2018.04.02 17:56:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:05 - Checking authorization ...
W 2018.04.02 17:56:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:05 - Checking authorization ...
W 2018.04.02 17:56:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:06 - Checking authorization ...
W 2018.04.02 17:56:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:06 - Checking authorization ...
W 2018.04.02 17:56:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:07 - Checking authorization ...
W 2018.04.02 17:56:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:07 - Checking authorization ...
W 2018.04.02 17:56:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:08 - Checking authorization ...
W 2018.04.02 17:56:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:08 - Checking authorization ...
W 2018.04.02 17:56:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:09 - Checking authorization ...
W 2018.04.02 17:56:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:09 - Checking authorization ...
W 2018.04.02 17:56:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:10 - Checking authorization ...
W 2018.04.02 17:56:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:10 - Checking authorization ...
W 2018.04.02 17:56:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:11 - Checking authorization ...
W 2018.04.02 17:56:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:11 - Checking authorization ...
W 2018.04.02 17:56:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:12 - Checking authorization ...
W 2018.04.02 17:56:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:12 - Checking authorization ...
W 2018.04.02 17:56:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:13 - Checking authorization ...
W 2018.04.02 17:56:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:13 - Checking authorization ...
W 2018.04.02 17:56:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:14 - Checking authorization ...
W 2018.04.02 17:56:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:14 - Checking authorization ...
W 2018.04.02 17:56:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:15 - Checking authorization ...
W 2018.04.02 17:56:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:15 - Checking authorization ...
W 2018.04.02 17:56:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:16 - Checking authorization ...
W 2018.04.02 17:56:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:16 - Checking authorization ...
W 2018.04.02 17:56:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:17 - Checking authorization ...
W 2018.04.02 17:56:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:17 - Checking authorization ...
W 2018.04.02 17:56:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:18 - Checking authorization ...
W 2018.04.02 17:56:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:18 - Checking authorization ...
W 2018.04.02 17:56:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:19 - Checking authorization ...
W 2018.04.02 17:56:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:19 - Checking authorization ...
W 2018.04.02 17:56:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:20 - Checking authorization ...
W 2018.04.02 17:56:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:20 - Checking authorization ...
W 2018.04.02 17:56:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:21 - Checking authorization ...
W 2018.04.02 17:56:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:21 - Checking authorization ...
W 2018.04.02 17:56:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:22 - Checking authorization ...
W 2018.04.02 17:56:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:22 - Checking authorization ...
W 2018.04.02 17:56:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:23 - Checking authorization ...
W 2018.04.02 17:56:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:23 - Checking authorization ...
W 2018.04.02 17:56:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:24 - Checking authorization ...
W 2018.04.02 17:56:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:24 - Checking authorization ...
W 2018.04.02 17:56:25 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:25 - Checking authorization ...
W 2018.04.02 17:56:25 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:25 - Checking authorization ...
W 2018.04.02 17:56:26 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:26 - Checking authorization ...
W 2018.04.02 17:56:26 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:26 - Checking authorization ...
W 2018.04.02 17:56:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:27 - Checking authorization ...
W 2018.04.02 17:56:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:27 - Checking authorization ...
W 2018.04.02 17:56:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:28 - Checking authorization ...
W 2018.04.02 17:56:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:28 - Checking authorization ...
W 2018.04.02 17:56:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:29 - Checking authorization ...
W 2018.04.02 17:56:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:29 - Checking authorization ...
W 2018.04.02 17:56:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:30 - Checking authorization ...
W 2018.04.02 17:56:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:30 - Checking authorization ...
W 2018.04.02 17:56:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:31 - Checking authorization ...
W 2018.04.02 17:56:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:31 - Checking authorization ...
W 2018.04.02 17:56:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:32 - Checking authorization ...
W 2018.04.02 17:56:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:32 - Checking authorization ...
W 2018.04.02 17:56:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:33 - Checking authorization ...
W 2018.04.02 17:56:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:33 - Checking authorization ...
W 2018.04.02 17:56:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:34 - Checking authorization ...
W 2018.04.02 17:56:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:34 - Checking authorization ...
W 2018.04.02 17:56:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:34 - Checking authorization ...
W 2018.04.02 17:56:35 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:35 - Checking authorization ...
W 2018.04.02 17:56:35 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:35 - Checking authorization ...
W 2018.04.02 17:56:36 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:36 - Checking authorization ...
W 2018.04.02 17:56:36 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:36 - Checking authorization ...
W 2018.04.02 17:56:37 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:37 - Checking authorization ...
W 2018.04.02 17:56:37 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:37 - Checking authorization ...
W 2018.04.02 17:56:38 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:38 - Checking authorization ...
W 2018.04.02 17:56:38 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:38 - Checking authorization ...
W 2018.04.02 17:56:39 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:39 - Checking authorization ...
W 2018.04.02 17:56:39 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:39 - Checking authorization ...
W 2018.04.02 17:56:40 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:40 - Checking authorization ...
W 2018.04.02 17:56:40 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:40 - Checking authorization ...
W 2018.04.02 17:56:41 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:41 - Checking authorization ...
W 2018.04.02 17:56:41 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:41 - Checking authorization ...
W 2018.04.02 17:56:42 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:42 - Checking authorization ...
W 2018.04.02 17:56:42 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:42 - Checking authorization ...
W 2018.04.02 17:56:43 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:43 - Checking authorization ...
W 2018.04.02 17:56:43 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:43 - Checking authorization ...
W 2018.04.02 17:56:44 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:44 - Checking authorization ...
W 2018.04.02 17:56:44 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:44 - Checking authorization ...
W 2018.04.02 17:56:45 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:45 - Checking authorization ...
W 2018.04.02 17:56:45 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:45 - Checking authorization ...
W 2018.04.02 17:56:46 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:46 - Checking authorization ...
W 2018.04.02 17:56:46 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:46 - Checking authorization ...
W 2018.04.02 17:56:47 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:47 - Checking authorization ...
W 2018.04.02 17:56:47 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:47 - Checking authorization ...
W 2018.04.02 17:56:48 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:48 - Checking authorization ...
W 2018.04.02 17:56:48 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:48 - Checking authorization ...
W 2018.04.02 17:56:49 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:49 - Checking authorization ...
W 2018.04.02 17:56:49 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:49 - Checking authorization ...
W 2018.04.02 17:56:50 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:50 - Checking authorization ...
W 2018.04.02 17:56:50 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:50 - Checking authorization ...
W 2018.04.02 17:56:51 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:51 - Checking authorization ...
W 2018.04.02 17:56:51 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:51 - Checking authorization ...
W 2018.04.02 17:56:52 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:52 - Checking authorization ...
W 2018.04.02 17:56:52 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:52 - Checking authorization ...
W 2018.04.02 17:56:53 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:53 - Checking authorization ...
W 2018.04.02 17:56:53 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:53 - Checking authorization ...
W 2018.04.02 17:56:54 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:54 - Checking authorization ...
W 2018.04.02 17:56:54 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:54 - Checking authorization ...
W 2018.04.02 17:56:55 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:55 - Checking authorization ...
W 2018.04.02 17:56:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:56 - Checking authorization ...
W 2018.04.02 17:56:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:56 - Checking authorization ...
W 2018.04.02 17:56:57 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:57 - Checking authorization ...
W 2018.04.02 17:56:57 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:57 - Checking authorization ...
W 2018.04.02 17:56:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:58 - Checking authorization ...
W 2018.04.02 17:56:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:58 - Checking authorization ...
W 2018.04.02 17:56:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:59 - Checking authorization ...
W 2018.04.02 17:56:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:56:59 - Checking authorization ...
W 2018.04.02 17:57:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:00 - Checking authorization ...
W 2018.04.02 17:57:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:00 - Checking authorization ...
W 2018.04.02 17:57:01 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:01 - Checking authorization ...
W 2018.04.02 17:57:01 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:01 - Checking authorization ...
W 2018.04.02 17:57:02 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:02 - Checking authorization ...
W 2018.04.02 17:57:03 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:03 - Checking authorization ...
W 2018.04.02 17:57:03 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:03 - Checking authorization ...
W 2018.04.02 17:57:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:04 - Checking authorization ...
W 2018.04.02 17:57:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:04 - Checking authorization ...
W 2018.04.02 17:57:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:05 - Checking authorization ...
W 2018.04.02 17:57:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:05 - Checking authorization ...
W 2018.04.02 17:57:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:06 - Checking authorization ...
W 2018.04.02 17:57:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:06 - Checking authorization ...
W 2018.04.02 17:57:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:07 - Checking authorization ...
W 2018.04.02 17:57:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:07 - Checking authorization ...
W 2018.04.02 17:57:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:08 - Checking authorization ...
W 2018.04.02 17:57:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:08 - Checking authorization ...
W 2018.04.02 17:57:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:09 - Checking authorization ...
W 2018.04.02 17:57:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:09 - Checking authorization ...
W 2018.04.02 17:57:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:10 - Checking authorization ...
W 2018.04.02 17:57:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:10 - Checking authorization ...
W 2018.04.02 17:57:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:11 - Checking authorization ...
W 2018.04.02 17:57:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:11 - Checking authorization ...
W 2018.04.02 17:57:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:12 - Checking authorization ...
W 2018.04.02 17:57:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:12 - Checking authorization ...
W 2018.04.02 17:57:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:13 - Checking authorization ...
W 2018.04.02 17:57:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:13 - Checking authorization ...
W 2018.04.02 17:57:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:14 - Checking authorization ...
W 2018.04.02 17:57:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:14 - Checking authorization ...
W 2018.04.02 17:57:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:15 - Checking authorization ...
W 2018.04.02 17:57:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:15 - Checking authorization ...
W 2018.04.02 17:57:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:16 - Checking authorization ...
W 2018.04.02 17:57:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:16 - Checking authorization ...
W 2018.04.02 17:57:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:17 - Checking authorization ...
W 2018.04.02 17:57:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:17 - Checking authorization ...
W 2018.04.02 17:57:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:18 - Checking authorization ...
W 2018.04.02 17:57:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:18 - Checking authorization ...
W 2018.04.02 17:57:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:19 - Checking authorization ...
W 2018.04.02 17:57:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:20 - Checking authorization ...
W 2018.04.02 17:57:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:20 - Checking authorization ...
W 2018.04.02 17:57:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:20 - Checking authorization ...
W 2018.04.02 17:57:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:21 - Checking authorization ...
W 2018.04.02 17:57:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:21 - Checking authorization ...
W 2018.04.02 17:57:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:22 - Checking authorization ...
W 2018.04.02 17:57:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:22 - Checking authorization ...
W 2018.04.02 17:57:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:23 - Checking authorization ...
W 2018.04.02 17:57:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:23 - Checking authorization ...
W 2018.04.02 17:57:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:24 - Checking authorization ...
W 2018.04.02 17:57:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:24 - Checking authorization ...
W 2018.04.02 17:57:25 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:25 - Checking authorization ...
W 2018.04.02 17:57:25 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:25 - Checking authorization ...
W 2018.04.02 17:57:26 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:26 - Checking authorization ...
W 2018.04.02 17:57:26 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:26 - Checking authorization ...
W 2018.04.02 17:57:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:27 - Checking authorization ...
W 2018.04.02 17:57:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:27 - Checking authorization ...
W 2018.04.02 17:57:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:28 - Checking authorization ...
W 2018.04.02 17:57:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:28 - Checking authorization ...
W 2018.04.02 17:57:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:29 - Checking authorization ...
W 2018.04.02 17:57:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:29 - Checking authorization ...
W 2018.04.02 17:57:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:30 - Checking authorization ...
W 2018.04.02 17:57:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:30 - Checking authorization ...
W 2018.04.02 17:57:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:31 - Checking authorization ...
W 2018.04.02 17:57:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:31 - Checking authorization ...
W 2018.04.02 17:57:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:32 - Checking authorization ...
W 2018.04.02 17:57:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:32 - Checking authorization ...
I 2018.04.02 17:57:33 - Cancel requested.
I 2018.04.02 17:57:33 - Session terminated.
I 2018.04.02 17:57:46 - Session starting.
I 2018.04.02 17:57:46 - Checking authorization ...
W 2018.04.02 17:57:48 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:48 - Checking authorization ...
W 2018.04.02 17:57:48 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:48 - Checking authorization ...
W 2018.04.02 17:57:49 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:49 - Checking authorization ...
W 2018.04.02 17:57:49 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:49 - Checking authorization ...
W 2018.04.02 17:57:50 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:50 - Checking authorization ...
W 2018.04.02 17:57:50 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:50 - Checking authorization ...
W 2018.04.02 17:57:51 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:51 - Checking authorization ...
W 2018.04.02 17:57:51 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:51 - Checking authorization ...
W 2018.04.02 17:57:52 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:52 - Checking authorization ...
W 2018.04.02 17:57:52 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:52 - Checking authorization ...
W 2018.04.02 17:57:53 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:53 - Checking authorization ...
W 2018.04.02 17:57:53 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:53 - Checking authorization ...
W 2018.04.02 17:57:54 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:54 - Checking authorization ...
W 2018.04.02 17:57:54 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:54 - Checking authorization ...
W 2018.04.02 17:57:55 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:55 - Checking authorization ...
W 2018.04.02 17:57:55 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:55 - Checking authorization ...
W 2018.04.02 17:57:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:56 - Checking authorization ...
W 2018.04.02 17:57:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:56 - Checking authorization ...
W 2018.04.02 17:57:57 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:57 - Checking authorization ...
W 2018.04.02 17:57:57 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:57 - Checking authorization ...
W 2018.04.02 17:57:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:58 - Checking authorization ...
W 2018.04.02 17:57:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:58 - Checking authorization ...
W 2018.04.02 17:57:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:59 - Checking authorization ...
W 2018.04.02 17:57:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:57:59 - Checking authorization ...
W 2018.04.02 17:58:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:00 - Checking authorization ...
W 2018.04.02 17:58:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:00 - Checking authorization ...
W 2018.04.02 17:58:01 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:01 - Checking authorization ...
W 2018.04.02 17:58:01 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:01 - Checking authorization ...
W 2018.04.02 17:58:02 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:02 - Checking authorization ...
W 2018.04.02 17:58:03 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:03 - Checking authorization ...
W 2018.04.02 17:58:03 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:03 - Checking authorization ...
W 2018.04.02 17:58:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:04 - Checking authorization ...
W 2018.04.02 17:58:04 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:04 - Checking authorization ...
W 2018.04.02 17:58:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:05 - Checking authorization ...
W 2018.04.02 17:58:05 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:05 - Checking authorization ...
W 2018.04.02 17:58:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:06 - Checking authorization ...
W 2018.04.02 17:58:06 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:06 - Checking authorization ...
W 2018.04.02 17:58:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:07 - Checking authorization ...
W 2018.04.02 17:58:07 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:07 - Checking authorization ...
W 2018.04.02 17:58:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:08 - Checking authorization ...
W 2018.04.02 17:58:08 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:08 - Checking authorization ...
W 2018.04.02 17:58:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:09 - Checking authorization ...
W 2018.04.02 17:58:09 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:09 - Checking authorization ...
W 2018.04.02 17:58:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:10 - Checking authorization ...
W 2018.04.02 17:58:10 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:10 - Checking authorization ...
W 2018.04.02 17:58:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:11 - Checking authorization ...
W 2018.04.02 17:58:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:11 - Checking authorization ...
W 2018.04.02 17:58:11 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:12 - Checking authorization ...
W 2018.04.02 17:58:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:12 - Checking authorization ...
W 2018.04.02 17:58:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:12 - Checking authorization ...
W 2018.04.02 17:58:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:13 - Checking authorization ...
W 2018.04.02 17:58:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:13 - Checking authorization ...
W 2018.04.02 17:58:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:14 - Checking authorization ...
W 2018.04.02 17:58:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:14 - Checking authorization ...
W 2018.04.02 17:58:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:15 - Checking authorization ...
W 2018.04.02 17:58:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:15 - Checking authorization ...
W 2018.04.02 17:58:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:16 - Checking authorization ...
W 2018.04.02 17:58:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:16 - Checking authorization ...
W 2018.04.02 17:58:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:17 - Checking authorization ...
W 2018.04.02 17:58:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:17 - Checking authorization ...
W 2018.04.02 17:58:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:18 - Checking authorization ...
W 2018.04.02 17:58:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:18 - Checking authorization ...
W 2018.04.02 17:58:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:19 - Checking authorization ...
W 2018.04.02 17:58:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:19 - Checking authorization ...
W 2018.04.02 17:58:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:20 - Checking authorization ...
W 2018.04.02 17:58:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:20 - Checking authorization ...
W 2018.04.02 17:58:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:20 - Checking authorization ...
W 2018.04.02 17:58:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:21 - Checking authorization ...
W 2018.04.02 17:58:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:21 - Checking authorization ...
W 2018.04.02 17:58:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:22 - Checking authorization ...
W 2018.04.02 17:58:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:22 - Checking authorization ...
W 2018.04.02 17:58:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:23 - Checking authorization ...
W 2018.04.02 17:58:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:23 - Checking authorization ...
W 2018.04.02 17:58:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:24 - Checking authorization ...
W 2018.04.02 17:58:24 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:24 - Checking authorization ...
I 2018.04.02 17:58:25 - Cancel requested.
I 2018.04.02 17:58:25 - Session terminated.
I 2018.04.02 17:58:26 - Session starting.
I 2018.04.02 17:58:26 - Checking authorization ...
W 2018.04.02 17:58:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:27 - Checking authorization ...
W 2018.04.02 17:58:27 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:27 - Checking authorization ...
W 2018.04.02 17:58:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:28 - Checking authorization ...
W 2018.04.02 17:58:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:28 - Checking authorization ...
W 2018.04.02 17:58:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:29 - Checking authorization ...
W 2018.04.02 17:58:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:29 - Checking authorization ...
W 2018.04.02 17:58:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:30 - Checking authorization ...
W 2018.04.02 17:58:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:30 - Checking authorization ...
W 2018.04.02 17:58:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:31 - Checking authorization ...
W 2018.04.02 17:58:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:31 - Checking authorization ...
W 2018.04.02 17:58:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:31 - Checking authorization ...
W 2018.04.02 17:58:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:32 - Checking authorization ...
W 2018.04.02 17:58:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:32 - Checking authorization ...
W 2018.04.02 17:58:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:33 - Checking authorization ...
W 2018.04.02 17:58:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:33 - Checking authorization ...
W 2018.04.02 17:58:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:34 - Checking authorization ...
W 2018.04.02 17:58:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:34 - Checking authorization ...
I 2018.04.02 17:58:35 - Cancel requested.
I 2018.04.02 17:58:35 - Session terminated.
I 2018.04.02 17:58:54 - Session starting.
I 2018.04.02 17:58:54 - Checking authorization ...
W 2018.04.02 17:58:55 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:55 - Checking authorization ...
W 2018.04.02 17:58:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:56 - Checking authorization ...
W 2018.04.02 17:58:56 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:56 - Checking authorization ...
W 2018.04.02 17:58:57 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:57 - Checking authorization ...
W 2018.04.02 17:58:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:58 - Checking authorization ...
W 2018.04.02 17:58:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:58 - Checking authorization ...
W 2018.04.02 17:58:58 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:58 - Checking authorization ...
W 2018.04.02 17:58:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:59 - Checking authorization ...
W 2018.04.02 17:58:59 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:58:59 - Checking authorization ...
W 2018.04.02 17:59:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:00 - Checking authorization ...
W 2018.04.02 17:59:00 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:00 - Checking authorization ...
W 2018.04.02 17:59:01 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:01 - Checking authorization ...
I 2018.04.02 17:59:01 - Cancel requested.
I 2018.04.02 17:59:01 - Session terminated.
I 2018.04.02 17:59:26 - Session starting.
I 2018.04.02 17:59:26 - Checking authorization ...
W 2018.04.02 17:59:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:28 - Checking authorization ...
W 2018.04.02 17:59:28 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:28 - Checking authorization ...
W 2018.04.02 17:59:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:29 - Checking authorization ...
W 2018.04.02 17:59:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:29 - Checking authorization ...
W 2018.04.02 17:59:29 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:29 - Checking authorization ...
W 2018.04.02 17:59:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:30 - Checking authorization ...
W 2018.04.02 17:59:30 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:30 - Checking authorization ...
W 2018.04.02 17:59:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:31 - Checking authorization ...
W 2018.04.02 17:59:31 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:31 - Checking authorization ...
W 2018.04.02 17:59:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:32 - Checking authorization ...
W 2018.04.02 17:59:32 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:32 - Checking authorization ...
W 2018.04.02 17:59:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:33 - Checking authorization ...
W 2018.04.02 17:59:33 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:33 - Checking authorization ...
W 2018.04.02 17:59:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:34 - Checking authorization ...
W 2018.04.02 17:59:34 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:34 - Checking authorization ...
W 2018.04.02 17:59:35 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:35 - Checking authorization ...
W 2018.04.02 17:59:35 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:35 - Checking authorization ...
W 2018.04.02 17:59:36 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 17:59:36 - Checking authorization ...
I 2018.04.02 17:59:36 - Cancel requested.
I 2018.04.02 17:59:36 - Session terminated.
I 2018.04.02 18:00:11 - Session starting.
I 2018.04.02 18:00:11 - Checking authorization ...
W 2018.04.02 18:00:12 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:12 - Checking authorization ...
W 2018.04.02 18:00:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:13 - Checking authorization ...
W 2018.04.02 18:00:13 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:13 - Checking authorization ...
W 2018.04.02 18:00:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:14 - Checking authorization ...
W 2018.04.02 18:00:14 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:14 - Checking authorization ...
W 2018.04.02 18:00:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:15 - Checking authorization ...
W 2018.04.02 18:00:15 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:15 - Checking authorization ...
W 2018.04.02 18:00:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:16 - Checking authorization ...
W 2018.04.02 18:00:16 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:16 - Checking authorization ...
W 2018.04.02 18:00:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:17 - Checking authorization ...
W 2018.04.02 18:00:17 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:17 - Checking authorization ...
W 2018.04.02 18:00:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:18 - Checking authorization ...
W 2018.04.02 18:00:18 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:18 - Checking authorization ...
W 2018.04.02 18:00:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:19 - Checking authorization ...
W 2018.04.02 18:00:19 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:19 - Checking authorization ...
W 2018.04.02 18:00:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:20 - Checking authorization ...
W 2018.04.02 18:00:20 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:20 - Checking authorization ...
W 2018.04.02 18:00:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:21 - Checking authorization ...
W 2018.04.02 18:00:21 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:21 - Checking authorization ...
W 2018.04.02 18:00:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:22 - Checking authorization ...
W 2018.04.02 18:00:22 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:22 - Checking authorization ...
W 2018.04.02 18:00:23 - Windows WFP, unexpected: Rule 'ipv6_block_all' already exists
I 2018.04.02 18:00:23 - Checking authorization ...
I 2018.04.02 18:00:23 - Cancel requested.
I 2018.04.02 18:00:23 - Session terminated.
I 2018.04.02 18:00:50 - Session starting.
I 2018.04.02 18:00:50 - Checking authorization ...
! 2018.04.02 18:00:51 - Connecting to Altarf (Sweden, Uppsala)
. 2018.04.02 18:00:52 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017
. 2018.04.02 18:00:52 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.02 18:00:52 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.02 18:00:52 - Connection to OpenVPN Management Interface
. 2018.04.02 18:00:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.02 18:00:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 18:00:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 18:00:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.140:443
. 2018.04.02 18:00:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.02 18:00:52 - OpenVPN > Attempting to establish TCP connection with [AF_INET]62.102.148.140:443 [nonblock]
. 2018.04.02 18:00:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.04.02 18:00:53 - OpenVPN > TCP connection established with [AF_INET]62.102.148.140:443
. 2018.04.02 18:00:53 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.04.02 18:00:53 - OpenVPN > TCP_CLIENT link remote: [AF_INET]62.102.148.140:443
. 2018.04.02 18:00:53 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=b670e6ba b881cf9e
. 2018.04.02 18:00:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.02 18:00:53 - OpenVPN > VERIFY KU OK
. 2018.04.02 18:00:53 - OpenVPN > Validating certificate extended key usage
. 2018.04.02 18:00:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.02 18:00:53 - OpenVPN > VERIFY EKU OK
. 2018.04.02 18:00:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Altarf, emailAddress=info@airvpn.org
. 2018.04.02 18:00:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.02 18:00:53 - OpenVPN > [Altarf] Peer Connection Initiated with [AF_INET]62.102.148.140:443
. 2018.04.02 18:00:55 - OpenVPN > SENT CONTROL [Altarf]: 'PUSH_REQUEST' (status=1)
. 2018.04.02 18:00:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.3.49 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.04.02 18:00:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.04.02 18:00:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.04.02 18:00:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.04.02 18:00:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.04.02 18:00:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.04.02 18:00:56 - OpenVPN > interactive service msg_channel=0
. 2018.04.02 18:00:56 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 I=4 HWADDR=a0:88:69:9d:df:af
. 2018.04.02 18:00:56 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.04.02 18:00:56 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2018.04.02 18:00:56 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE: failed to parse/resolve route for host/network: fc00::/7
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE: failed to parse/resolve route for host/network: 3000::/4
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE: failed to parse/resolve route for host/network: 2000::/4
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
. 2018.04.02 18:00:56 - OpenVPN > OpenVPN ROUTE: failed to parse/resolve route for host/network: ::/3
. 2018.04.02 18:00:56 - OpenVPN > open_tun
. 2018.04.02 18:00:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D32CA31B-09C6-4BC9-BEB7-CD7E9A55C4DA}.tap
. 2018.04.02 18:00:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.04.02 18:00:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.3.49/255.255.0.0 [sUCCEEDED]
. 2018.04.02 18:00:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.3.49/255.255.0.0 on interface {D32CA31B-09C6-4BC9-BEB7-CD7E9A55C4DA} [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2018.04.02 18:00:56 - OpenVPN > Successful ARP Flush on interface [6] {D32CA31B-09C6-4BC9-BEB7-CD7E9A55C4DA}
. 2018.04.02 18:00:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.04.02 18:01:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.04.02 18:01:02 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.140 MASK 255.255.255.255 192.168.43.1
. 2018.04.02 18:01:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.04.02 18:01:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.02 18:01:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.04.02 18:01:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.04.02 18:01:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.02 18:01:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2018.04.02 18:01:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.04.02 18:01:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
W 2018.04.02 18:01:02 - OpenVPN > WARNING: OpenVPN was configured to add an IPv6 route over Ethernet 2. However, no IPv6 has been configured for this interface, therefore the route installation may fail or may not work as expected.
. 2018.04.02 18:01:02 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.04.02 18:01:02 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.04.02 18:01:02 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.5.0.1)
. 2018.04.02 18:01:02 - Routes, added a new route, 62.102.148.152 for gateway 10.5.0.1
. 2018.04.02 18:01:02 - Flushing DNS
! 2018.04.02 18:01:05 - Connected.
. 2018.04.02 18:01:05 - OpenVPN > Initialization Sequence Completed
. 2018.04.02 18:03:34 - Updating systems & servers data ...
. 2018.04.02 18:03:37 - Systems & servers data update completed


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Updated to 2.14.2  

 

No connection possible (SIGTERM), if "Remove the gateway route" is checked. Error or ok?

Share this post


Link to post

To add to the pile, minimize to tray / tray indicator is not functioning.

 

System:

Archlinux (latest updates)

Cinnamon desktop version 3.6.7

Eddie:  2.14.2

Share this post


Link to post

Weird, now for me neither the beta or the release versions of Eddie work at all. Always stuck on "Checking route" in 2.13, or "Checking IPv4" on the beta. Even with the AirDNS unchecked, and the tunnel testing unchecked. I havent used either one in a few weeks, since it started giving me grief and always hanging up and getting stuck out of nowhere, but Tunnelblick crashed on me earlier, so I decided to try out Eddie again and got nowhere. Ended up having to fire Tunnelblick back up. Tunnelblick now has a network lock of its own, but its a bit more heavy handed than Eddies haha. When it gets disconnected, it basically shuts off your network services and wi-fi period in the Network prefs, so you cant even reconnect to the servers until you turn it back on heh. I kinda liked the PF method better.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...