Jump to content
Not connected, Your IP: 34.204.0.181
Staff

Eddie 2.14beta released

Recommended Posts

Hello,

 

I may have come across another bug/issue. On every launch of Eddie, i get the following in my logs:

W 2018.03.03 00:51:58 - Recovery. Unexpected crash?
If my memory serves me, in versions of Eddie prior to 2.14, the Recovery.xml was always deleted when Eddie closed. In Eddie 2.14, the Recovery.xml is not deleted. If I delete it prior to launching Eddie, I do not get this error. (I am on Windows 10 Pro 64-bit)

Has this changed for some reason or is this a bug/issue that needs to be addressed?

Share this post


Link to post

OS X High Sierra 10.13.3 : 
When i blacklist a server, it will still connect to it when i press "Connect to a recommended server". Should't be like that, or am i doing something wrong?

Share this post


Link to post

Another thing, I am unable to see score or latency after refreshing the server list.

attachicon.gifScreen Shot 2018-03-03 at 7.49.52 PM.png

 

 

I have got into the habit of refreshing the servers list every time I try to connect, and I have just noticed that the only time it fails to connect is when the latency column has no entries in it. The only way to correct this problem is to quit and restart Eddie, although sometimes I have to do it two or three times before I get results back in the latency column.

 

Eddie 2.14.2 seems to be running fine on El Capitan apart from this occasional connection problem. I'm wondering what can be causing this problem with latency, as it just seems to happen mid-session.

Share this post


Link to post

 

Another thing, I am unable to see score or latency after refreshing the server list.

attachicon.gifScreen Shot 2018-03-03 at 7.49.52 PM.png

 

 

I have got into the habit of refreshing the servers list every time I try to connect, and I have just noticed that the only time it fails to connect is when the latency column has no entries in it. The only way to correct this problem is to quit and restart Eddie, although sometimes I have to do it two or three times before I get results back in the latency column.

 

Eddie 2.14.2 seems to be running fine on El Capitan apart from this occasional connection problem. I'm wondering what can be causing this problem with latency, as it just seems to happen mid-session.

 

Well, I have never bothered to refresh the servers, but after reading your post, I thought I'd just give it a go to see if the same thing happens to me. Sure enough, everything in the latency column disappeared and so far will not come back. Must be aliens at work. The score column is also no longer showing any green stars.

Share this post


Link to post

 

 

Another thing, I am unable to see score or latency after refreshing the server list.

attachicon.gifScreen Shot 2018-03-03 at 7.49.52 PM.png

 

 

I have got into the habit of refreshing the servers list every time I try to connect, and I have just noticed that the only time it fails to connect is when the latency column has no entries in it. The only way to correct this problem is to quit and restart Eddie, although sometimes I have to do it two or three times before I get results back in the latency column.

 

Eddie 2.14.2 seems to be running fine on El Capitan apart from this occasional connection problem. I'm wondering what can be causing this problem with latency, as it just seems to happen mid-session.

 

Well, I have never bothered to refresh the servers, but after reading your post, I thought I'd just give it a go to see if the same thing happens to me. Sure enough, everything in the latency column disappeared and so far will not come back. Must be aliens at work. The score column is also no longer showing any green stars.

 

What I've discovered is that if you refresh them while still connected, then the latency column will go completely blank with no figures visible, but if you disconnect from a server and then refresh them, then the column will fill up with figures as normal. However, as I mentioned, on some occasions I can't get the latency column to refresh no matter how many times I try to refresh the servers, and it's at that point where I have to restart Eddie completely - obviously, something has gone wrong on those occasions.

Share this post


Link to post

What I've discovered is that if you refresh them while still connected, then the latency column will go completely blank

 

That's expected and intended. It's not a bug and it is not a different behavior than previous Eddie releases. The logic is that it makes sense to rate a server not from another server (otherwise the general system score would be more accurate), but from your node.

 

Kind regards

Share this post


Link to post

 

What I've discovered is that if you refresh them while still connected, then the latency column will go completely blank

 

That's expected and intended. It's not a bug and it is not a different behavior than previous Eddie releases. The logic is that it makes sense to rate a server not from another server (otherwise the general system score would be more accurate), but from your node.

 

Kind regards

 

But if you let Eddie periodically auto-update the server list (whether you have the setting set for auto, 1 minute, 10 minutes, etc), then it *will* give new, updated ping times. The new times are usually similar to the times when you're not connected, and they are clearly not server-to-server because servers hosted by the same provider would naturally have very low latencies.

 

If the app's behavior is expected and intended when you click when you're connected, then why wouldn't it also be expected and intended when it auto-updates when you're connected?

Share this post


Link to post

Just wondering where the more recent source code is... I made a thread a couple weeks ago (link to thread) but haven't gotten any replies. Figured I'd post here since it's referring to the source for 2.14beta.

 

@Staff and @Clodo -- Care to comment on this?

Share this post


Link to post

But if you let Eddie periodically auto-update the server list (whether you have the setting set for auto, 1 minute, 10 minutes, etc), then it *will* give new, updated ping times.

 

The ping times are not updated from your node while the system is connected to the VPN, but other data are downloaded (very useful when you can't update such data while not connected to the VPN, for blocks etc.). Once you update manually, the old ping times are no more displayed.

 

Care to comment on this? [source code of beta versions]

 

Currently only stable versions source code is available. This is not immutable but it has been a habit so far for practical reasons.

 

Kind regards

Share this post


Link to post

 

 

Eddie 2.14.2 on Linux Mint 18 Cinnamon is still getting bootstrap error pop-ups for me.

 

Steps:

 

  1. Run Eddie as normal, connected to a location.
  2. Put PC into hibernation/sleep, mid-session.
  3. Re-open computer and Eddie sometimes shows bootstrap errors.
  • Network Lock On.
  • Air DNS On.
  • Check Air tunnel On.
  • UDP protocol.

Same here, only my PC is on 24/7, the bootstrap window sometimes (rarely)(twice since 2.14.2 hit the PPA) shows up after screensaver, Mint 18.3 Cinnamon.

 

Just got the "bootstrap" error for the second time this morning. Just cancelled to close the warning and all SEEMS fine. Both times, the warning was there when "waking" my iMac in the morning. The first time it happened was quite a few days ago. Here's my log:

. 2018.03.10 10:14:11 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 10:14:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 10:20:23 - Updating systems & servers data ...

. 2018.03.10 10:20:26 - Systems & servers data update completed

. 2018.03.10 10:30:37 - Updating systems & servers data ...

. 2018.03.10 10:30:40 - Systems & servers data update completed

. 2018.03.10 10:40:53 - Updating systems & servers data ...

. 2018.03.10 10:40:56 - Systems & servers data update completed

. 2018.03.10 10:51:01 - Updating systems & servers data ...

. 2018.03.10 10:51:03 - Systems & servers data update completed

. 2018.03.10 11:01:08 - Updating systems & servers data ...

. 2018.03.10 11:01:11 - Systems & servers data update completed

. 2018.03.10 11:11:17 - Updating systems & servers data ...

. 2018.03.10 11:11:19 - Systems & servers data update completed

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 11:14:11 - OpenVPN > VERIFY KU OK

. 2018.03.10 11:14:11 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 11:14:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 11:14:11 - OpenVPN > VERIFY EKU OK

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 11:21:26 - Updating systems & servers data ...

. 2018.03.10 11:21:29 - Systems & servers data update completed

. 2018.03.10 11:31:39 - Updating systems & servers data ...

. 2018.03.10 11:31:43 - Systems & servers data update completed

. 2018.03.10 11:41:49 - Updating systems & servers data ...

. 2018.03.10 11:41:54 - Systems & servers data update completed

. 2018.03.10 11:52:00 - Updating systems & servers data ...

. 2018.03.10 11:52:03 - Systems & servers data update completed

. 2018.03.10 12:02:11 - Updating systems & servers data ...

. 2018.03.10 12:02:13 - Systems & servers data update completed

. 2018.03.10 12:12:20 - Updating systems & servers data ...

. 2018.03.10 12:12:23 - Systems & servers data update completed

. 2018.03.10 12:14:11 - Renewing TLS key

. 2018.03.10 12:14:11 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > VERIFY KU OK

. 2018.03.10 12:14:12 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 12:14:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 12:14:12 - OpenVPN > VERIFY EKU OK

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 12:22:28 - Updating systems & servers data ...

. 2018.03.10 12:22:31 - Systems & servers data update completed

. 2018.03.10 12:32:36 - Updating systems & servers data ...

. 2018.03.10 12:32:44 - Systems & servers data update completed

. 2018.03.10 12:42:48 - Updating systems & servers data ...

. 2018.03.10 12:42:51 - Systems & servers data update completed

. 2018.03.10 12:53:03 - Updating systems & servers data ...

. 2018.03.10 12:53:08 - Systems & servers data update completed

. 2018.03.10 13:03:15 - Updating systems & servers data ...

. 2018.03.10 13:03:19 - Systems & servers data update completed

. 2018.03.10 13:13:24 - Updating systems & servers data ...

. 2018.03.10 13:13:27 - Systems & servers data update completed

. 2018.03.10 13:14:12 - OpenVPN > TLS: soft reset sec=0 bytes=11428602/-1 pkts=27756/0

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 13:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 13:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 13:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 13:23:33 - Updating systems & servers data ...

. 2018.03.10 13:23:36 - Systems & servers data update completed

. 2018.03.10 13:34:26 - Updating systems & servers data ...

. 2018.03.10 13:34:33 - Systems & servers data update completed

. 2018.03.10 13:44:38 - Updating systems & servers data ...

. 2018.03.10 13:44:42 - Systems & servers data update completed

. 2018.03.10 13:54:47 - Updating systems & servers data ...

. 2018.03.10 13:54:51 - Systems & servers data update completed

. 2018.03.10 14:04:57 - Updating systems & servers data ...

. 2018.03.10 14:05:03 - Systems & servers data update completed

. 2018.03.10 14:14:12 - Renewing TLS key

. 2018.03.10 14:14:12 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 14:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=4261915/-1 pkts=16397/0

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 14:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 14:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 14:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 14:15:09 - Updating systems & servers data ...

. 2018.03.10 14:15:13 - Systems & servers data update completed

. 2018.03.10 14:25:28 - Updating systems & servers data ...

. 2018.03.10 14:25:31 - Systems & servers data update completed

. 2018.03.10 14:35:45 - Updating systems & servers data ...

. 2018.03.10 14:35:50 - Systems & servers data update completed

. 2018.03.10 14:45:55 - Updating systems & servers data ...

. 2018.03.10 14:45:59 - Systems & servers data update completed

. 2018.03.10 14:56:04 - Updating systems & servers data ...

. 2018.03.10 14:56:12 - Systems & servers data update completed

. 2018.03.10 15:06:25 - Updating systems & servers data ...

. 2018.03.10 15:06:28 - Systems & servers data update completed

. 2018.03.10 15:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=29362742/-1 pkts=56917/0

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 15:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 15:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 15:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 15:16:40 - Updating systems & servers data ...

. 2018.03.10 15:16:43 - Systems & servers data update completed

. 2018.03.10 15:41:08 - Updating systems & servers data ...

. 2018.03.10 15:41:20 - Systems & servers data update completed

. 2018.03.10 15:51:44 - Updating systems & servers data ...

. 2018.03.10 15:51:53 - Systems & servers data update completed

. 2018.03.10 16:02:07 - Updating systems & servers data ...

. 2018.03.10 16:02:12 - Systems & servers data update completed

. 2018.03.10 16:12:20 - Updating systems & servers data ...

. 2018.03.10 16:12:23 - Systems & servers data update completed

. 2018.03.10 16:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=16284033/-1 pkts=34367/0

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 16:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 16:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 16:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 16:22:28 - Updating systems & servers data ...

. 2018.03.10 16:22:30 - Systems & servers data update completed

. 2018.03.10 16:32:35 - Updating systems & servers data ...

. 2018.03.10 16:32:44 - Systems & servers data update completed

. 2018.03.10 16:42:49 - Updating systems & servers data ...

. 2018.03.10 16:42:52 - Systems & servers data update completed

. 2018.03.10 16:52:57 - Updating systems & servers data ...

. 2018.03.10 16:53:00 - Systems & servers data update completed

. 2018.03.10 17:03:14 - Updating systems & servers data ...

. 2018.03.10 17:03:16 - Systems & servers data update completed

. 2018.03.10 17:13:22 - Updating systems & servers data ...

. 2018.03.10 17:13:25 - Systems & servers data update completed

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 17:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 17:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 17:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 17:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 17:23:36 - Updating systems & servers data ...

. 2018.03.10 17:23:39 - Systems & servers data update completed

. 2018.03.10 17:33:48 - Updating systems & servers data ...

. 2018.03.10 17:33:51 - Systems & servers data update completed

. 2018.03.10 17:43:56 - Updating systems & servers data ...

. 2018.03.10 17:43:58 - Systems & servers data update completed

. 2018.03.10 17:54:03 - Updating systems & servers data ...

. 2018.03.10 17:54:06 - Systems & servers data update completed

. 2018.03.10 18:04:11 - Updating systems & servers data ...

. 2018.03.10 18:04:14 - Systems & servers data update completed

. 2018.03.10 18:14:14 - Renewing TLS key

. 2018.03.10 18:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 18:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 18:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 18:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 18:14:19 - Updating systems & servers data ...

. 2018.03.10 18:14:22 - Systems & servers data update completed

. 2018.03.10 18:42:42 - Updating systems & servers data ...

. 2018.03.10 18:42:55 - Systems & servers data update completed

. 2018.03.10 19:08:00 - Updating systems & servers data ...

. 2018.03.10 19:08:06 - Systems & servers data update completed

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.10 19:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 19:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 19:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 19:19:24 - Updating systems & servers data ...

. 2018.03.10 19:19:26 - Systems & servers data update completed

. 2018.03.10 19:33:22 - Updating systems & servers data ...

. 2018.03.10 19:33:28 - Systems & servers data update completed

. 2018.03.10 20:01:00 - Updating systems & servers data ...

. 2018.03.10 20:01:14 - Systems & servers data update completed

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 20:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 20:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 20:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 20:14:19 - Updating systems & servers data ...

. 2018.03.10 20:14:25 - Systems & servers data update completed

. 2018.03.10 20:24:41 - Updating systems & servers data ...

. 2018.03.10 20:24:43 - Systems & servers data update completed

. 2018.03.10 20:34:48 - Updating systems & servers data ...

. 2018.03.10 20:34:50 - Systems & servers data update completed

. 2018.03.10 20:44:55 - Updating systems & servers data ...

. 2018.03.10 20:44:58 - Systems & servers data update completed

. 2018.03.10 20:55:03 - Updating systems & servers data ...

. 2018.03.10 20:55:05 - Systems & servers data update completed

. 2018.03.10 21:05:10 - Updating systems & servers data ...

. 2018.03.10 21:05:13 - Systems & servers data update completed

. 2018.03.10 21:14:14 - Renewing TLS key

. 2018.03.10 21:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 21:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 21:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 21:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 21:15:18 - Updating systems & servers data ...

. 2018.03.10 21:15:23 - Systems & servers data update completed

. 2018.03.10 21:36:01 - Updating systems & servers data ...

. 2018.03.10 21:36:17 - Systems & servers data update completed

. 2018.03.10 22:05:08 - Updating systems & servers data ...

. 2018.03.10 22:05:11 - Systems & servers data update completed

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > VERIFY KU OK

. 2018.03.10 22:14:19 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 22:14:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 22:14:19 - OpenVPN > VERIFY EKU OK

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 22:33:38 - Updating systems & servers data ...

. 2018.03.10 22:33:51 - Systems & servers data update completed

. 2018.03.10 23:07:32 - Updating systems & servers data ...

. 2018.03.10 23:08:00 - Systems & servers data update completed

. 2018.03.10 23:14:20 - OpenVPN > TLS: soft reset sec=0 bytes=267439940/-1 pkts=492179/0

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.10 23:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 23:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 23:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 23:40:12 - Updating systems & servers data ...

. 2018.03.10 23:40:23 - Systems & servers data update completed

. 2018.03.11 00:11:56 - Updating systems & servers data ...

. 2018.03.11 00:12:00 - Systems & servers data update completed

. 2018.03.11 00:14:22 - OpenVPN > TLS: soft reset sec=0 bytes=3248013/-1 pkts=13978/0

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.11 00:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 00:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 00:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 00:41:42 - Updating systems & servers data ...

. 2018.03.11 00:41:54 - Systems & servers data update completed

. 2018.03.11 01:11:46 - Updating systems & servers data ...

. 2018.03.11 01:11:51 - Systems & servers data update completed

. 2018.03.11 01:14:17 - OpenVPN > TLS: soft reset sec=0 bytes=3632647/-1 pkts=14731/0

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > VERIFY KU OK

. 2018.03.11 01:14:17 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 01:14:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 01:14:17 - OpenVPN > VERIFY EKU OK

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 01:37:00 - Updating systems & servers data ...

. 2018.03.11 01:37:16 - Systems & servers data update completed

. 2018.03.11 03:14:27 - Renewing TLS key

. 2018.03.11 03:14:27 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 03:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3466857/-1 pkts=14682/0

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 03:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 03:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 03:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 03:17:01 - Updating systems & servers data ...

. 2018.03.11 03:17:06 - Systems & servers data update completed

. 2018.03.11 03:58:00 - Updating systems & servers data ...

. 2018.03.11 03:58:05 - Systems & servers data update completed

. 2018.03.11 04:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3915096/-1 pkts=15788/0

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 04:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 04:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 04:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 04:40:00 - Updating systems & servers data ...

. 2018.03.11 04:40:22 - Systems & servers data update completed

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 05:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 05:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 05:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 05:20:41 - Updating systems & servers data ...

. 2018.03.11 05:21:00 - Systems & servers data update completed

. 2018.03.11 05:36:06 - Updating systems & servers data ...

. 2018.03.11 05:36:10 - Systems & servers data update completed

. 2018.03.11 05:46:21 - Updating systems & servers data ...

. 2018.03.11 05:46:24 - Systems & servers data update completed

. 2018.03.11 05:56:37 - Updating systems & servers data ...

. 2018.03.11 05:56:39 - Systems & servers data update completed

. 2018.03.11 06:06:47 - Updating systems & servers data ...

. 2018.03.11 06:06:51 - Systems & servers data update completed

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 06:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 06:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 06:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 06:16:59 - Updating systems & servers data ...

. 2018.03.11 06:17:02 - Systems & servers data update completed

. 2018.03.11 06:27:09 - Updating systems & servers data ...

. 2018.03.11 06:27:11 - Systems & servers data update completed

. 2018.03.11 06:37:23 - Updating systems & servers data ...

. 2018.03.11 06:37:25 - Systems & servers data update completed

. 2018.03.11 06:47:38 - Updating systems & servers data ...

. 2018.03.11 06:47:40 - Systems & servers data update completed

. 2018.03.11 06:57:49 - Updating systems & servers data ...

. 2018.03.11 06:57:52 - Systems & servers data update completed

. 2018.03.11 07:07:59 - Updating systems & servers data ...

. 2018.03.11 07:08:00 - Systems & servers data update completed

. 2018.03.11 07:14:16 - OpenVPN > TLS: soft reset sec=0 bytes=40452973/-1 pkts=66132/0

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 07:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 07:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 07:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 07:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 07:18:06 - Updating systems & servers data ...

. 2018.03.11 07:18:08 - Systems & servers data update completed

. 2018.03.11 07:28:13 - Updating systems & servers data ...

. 2018.03.11 07:28:19 - Systems & servers data update completed

. 2018.03.11 07:38:25 - Updating systems & servers data ...

. 2018.03.11 07:38:27 - Systems & servers data update completed

. 2018.03.11 07:57:13 - Updating systems & servers data ...

. 2018.03.11 07:57:15 - Systems & servers data update completed

. 2018.03.11 08:14:18 - Renewing TLS key

. 2018.03.11 08:14:18 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 08:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 08:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 08:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 08:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 08:14:56 - Updating systems & servers data ...

. 2018.03.11 08:15:04 - Systems & servers data update completed

. 2018.03.11 08:25:16 - Updating systems & servers data ...

. 2018.03.11 08:25:18 - Systems & servers data update completed

. 2018.03.11 08:35:26 - Updating systems & servers data ...

. 2018.03.11 08:35:28 - Systems & servers data update completed

. 2018.03.11 08:45:34 - Updating systems & servers data ...

. 2018.03.11 08:45:38 - Systems & servers data update completed

. 2018.03.11 08:55:49 - Updating systems & servers data ...

. 2018.03.11 08:55:51 - Systems & servers data update completed

. 2018.03.11 09:05:58 - Updating systems & servers data ...

. 2018.03.11 09:06:01 - Systems & servers data update completed

. 2018.03.11 09:14:17 - Renewing TLS key

. 2018.03.11 09:14:17 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 09:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=36221158/-1 pkts=59303/0

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 09:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 09:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 09:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 09:16:09 - Updating systems & servers data ...

. 2018.03.11 09:16:11 - Systems & servers data update completed

. 2018.03.11 09:26:21 - Updating systems & servers data ...

. 2018.03.11 09:26:24 - Systems & servers data update completed

. 2018.03.11 09:36:31 - Updating systems & servers data ...

. 2018.03.11 09:36:34 - Systems & servers data update completed

. 2018.03.11 09:46:39 - Updating systems & servers data ...

. 2018.03.11 09:46:42 - Systems & servers data update completed

. 2018.03.11 09:56:48 - Updating systems & servers data ...

. 2018.03.11 09:56:49 - Systems & servers data update completed

. 2018.03.11 10:06:56 - Updating systems & servers data ...

. 2018.03.11 10:06:59 - Systems & servers data update completed

. 2018.03.11 10:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=12504721/-1 pkts=29323/0

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 10:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 10:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 10:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 10:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 10:17:07 - Updating systems & servers data ...

. 2018.03.11 10:17:11 - Systems & servers data update completed

. 2018.03.11 10:27:18 - Updating systems & servers data ...

. 2018.03.11 10:27:20 - Systems & servers data update completed

. 2018.03.11 10:37:25 - Updating systems & servers data ...

. 2018.03.11 10:37:29 - Systems & servers data update completed

. 2018.03.11 10:47:34 - Updating systems & servers data ...

. 2018.03.11 10:47:37 - Systems & servers data update completed

. 2018.03.11 10:57:42 - Updating systems & servers data ...

. 2018.03.11 10:57:45 - Systems & servers data update completed

. 2018.03.11 11:14:28 - Renewing TLS key

. 2018.03.11 11:14:28 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 11:14:28 - OpenVPN > TLS: soft reset sec=0 bytes=6348225/-1 pkts=19902/0

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 11:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 11:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 11:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 11:31:51 - Updating systems & servers data ...

. 2018.03.11 11:31:54 - Systems & servers data update completed

. 2018.03.11 11:41:53 - Updating systems & servers data ...

. 2018.03.11 11:41:59 - Systems & servers data update completed

. 2018.03.11 11:52:07 - Updating systems & servers data ...

. 2018.03.11 11:52:12 - Systems & servers data update completed

. 2018.03.11 12:02:23 - Updating systems & servers data ...

. 2018.03.11 12:02:27 - Systems & servers data update completed

. 2018.03.11 12:12:36 - Updating systems & servers data ...

. 2018.03.11 12:12:39 - Systems & servers data update completed

. 2018.03.11 12:14:19 - Renewing TLS key

. 2018.03.11 12:14:19 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 12:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 12:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 12:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 12:22:49 - Updating systems & servers data ...

. 2018.03.11 12:22:52 - Systems & servers data update completed

. 2018.03.11 12:33:01 - Updating systems & servers data ...

. 2018.03.11 12:33:04 - Systems & servers data update completed

. 2018.03.11 12:43:14 - Updating systems & servers data ...

. 2018.03.11 12:43:17 - Systems & servers data update completed

. 2018.03.11 12:53:25 - Updating systems & servers data ...

. 2018.03.11 12:53:27 - Systems & servers data update completed

. 2018.03.11 13:03:32 - Updating systems & servers data ...

. 2018.03.11 13:03:36 - Systems & servers data update completed

. 2018.03.11 13:13:41 - Updating systems & servers data ...

. 2018.03.11 13:13:43 - Systems & servers data update completed

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 13:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 13:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 13:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 13:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 13:23:50 - Updating systems & servers data ...

. 2018.03.11 13:23:54 - Systems & servers data update completed

. 2018.03.11 13:33:59 - Updating systems & servers data ...

. 2018.03.11 13:34:01 - Systems & servers data update completed

. 2018.03.11 13:44:06 - Updating systems & servers data ...

. 2018.03.11 13:44:08 - Systems & servers data update completed

. 2018.03.11 13:54:14 - Updating systems & servers data ...

. 2018.03.11 13:54:16 - Systems & servers data update completed

. 2018.03.11 14:04:28 - Updating systems & servers data ...

. 2018.03.11 14:04:30 - Systems & servers data update completed

. 2018.03.11 14:14:20 - Renewing TLS key

. 2018.03.11 14:14:20 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 14:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=18715784/-1 pkts=33804/0

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 14:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 14:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 14:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 14:14:37 - Updating systems & servers data ...

. 2018.03.11 14:14:42 - Systems & servers data update completed

. 2018.03.11 14:24:47 - Updating systems & servers data ...

. 2018.03.11 14:24:50 - Systems & servers data update completed

. 2018.03.11 14:34:58 - Updating systems & servers data ...

. 2018.03.11 14:35:01 - Systems & servers data update completed

. 2018.03.11 14:45:09 - Updating systems & servers data ...

. 2018.03.11 14:45:12 - Systems & servers data update completed

. 2018.03.11 14:55:19 - Updating systems & servers data ...

. 2018.03.11 14:55:21 - Systems & servers data update completed

. 2018.03.11 15:05:32 - Updating systems & servers data ...

. 2018.03.11 15:05:35 - Systems & servers data update completed

. 2018.03.11 15:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=168183365/-1 pkts=248680/0

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 15:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 15:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 15:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 15:15:41 - Updating systems & servers data ...

. 2018.03.11 15:15:43 - Systems & servers data update completed

. 2018.03.11 15:25:48 - Updating systems & servers data ...

. 2018.03.11 15:25:50 - Systems & servers data update completed

. 2018.03.11 15:35:57 - Updating systems & servers data ...

. 2018.03.11 15:36:01 - Systems & servers data update completed

. 2018.03.11 15:46:10 - Updating systems & servers data ...

. 2018.03.11 15:46:12 - Systems & servers data update completed

. 2018.03.11 15:56:17 - Updating systems & servers data ...

. 2018.03.11 15:56:19 - Systems & servers data update completed

. 2018.03.11 16:06:24 - Updating systems & servers data ...

. 2018.03.11 16:06:27 - Systems & servers data update completed

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 16:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 16:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 16:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 16:16:32 - Updating systems & servers data ...

. 2018.03.11 16:16:38 - Systems & servers data update completed

. 2018.03.11 16:26:44 - Updating systems & servers data ...

. 2018.03.11 16:26:48 - Systems & servers data update completed

. 2018.03.11 16:36:57 - Updating systems & servers data ...

. 2018.03.11 16:36:59 - Systems & servers data update completed

. 2018.03.11 16:47:08 - Updating systems & servers data ...

. 2018.03.11 16:47:11 - Systems & servers data update completed

. 2018.03.11 16:57:21 - Updating systems & servers data ...

. 2018.03.11 16:57:24 - Systems & servers data update completed

. 2018.03.11 17:07:36 - Updating systems & servers data ...

. 2018.03.11 17:07:40 - Systems & servers data update completed

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 17:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 17:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 17:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 17:17:45 - Updating systems & servers data ...

. 2018.03.11 17:17:50 - Systems & servers data update completed

. 2018.03.11 17:27:57 - Updating systems & servers data ...

. 2018.03.11 17:28:01 - Systems & servers data update completed

. 2018.03.11 17:38:06 - Updating systems & servers data ...

. 2018.03.11 17:38:09 - Systems & servers data update completed

. 2018.03.11 17:48:16 - Updating systems & servers data ...

. 2018.03.11 17:48:19 - Systems & servers data update completed

. 2018.03.11 17:58:27 - Updating systems & servers data ...

. 2018.03.11 17:58:29 - Systems & servers data update completed

. 2018.03.11 18:08:34 - Updating systems & servers data ...

. 2018.03.11 18:08:37 - Systems & servers data update completed

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 18:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 18:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 18:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 18:18:43 - Updating systems & servers data ...

. 2018.03.11 18:18:46 - Systems & servers data update completed

. 2018.03.11 18:28:53 - Updating systems & servers data ...

. 2018.03.11 18:28:55 - Systems & servers data update completed

. 2018.03.11 18:39:06 - Updating systems & servers data ...

. 2018.03.11 18:39:09 - Systems & servers data update completed

. 2018.03.11 18:49:21 - Updating systems & servers data ...

. 2018.03.11 18:49:26 - Systems & servers data update completed

. 2018.03.11 18:59:36 - Updating systems & servers data ...

. 2018.03.11 18:59:40 - Systems & servers data update completed

. 2018.03.11 19:09:45 - Updating systems & servers data ...

. 2018.03.11 19:09:51 - Systems & servers data update completed

. 2018.03.11 19:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=36399159/-1 pkts=57275/0

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 19:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 19:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 19:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 19:19:57 - Updating systems & servers data ...

. 2018.03.11 19:20:00 - Systems & servers data update completed

. 2018.03.11 19:30:07 - Updating systems & servers data ...

. 2018.03.11 19:30:10 - Systems & servers data update completed

. 2018.03.11 19:40:22 - Updating systems & servers data ...

. 2018.03.11 19:40:26 - Systems & servers data update completed

. 2018.03.11 20:05:15 - Updating systems & servers data ...

. 2018.03.11 20:05:26 - Systems & servers data update completed

. 2018.03.11 20:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=9771731/-1 pkts=21291/0

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 20:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 20:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 20:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 20:27:21 - Updating systems & servers data ...

. 2018.03.11 20:27:31 - Systems & servers data update completed

. 2018.03.11 20:45:37 - Updating systems & servers data ...

. 2018.03.11 20:45:48 - Systems & servers data update completed

. 2018.03.11 21:11:56 - Updating systems & servers data ...

. 2018.03.11 21:12:01 - Systems & servers data update completed

. 2018.03.11 21:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=384457896/-1 pkts=720153/0

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 21:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 21:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 21:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 21:26:24 - Updating systems & servers data ...

. 2018.03.11 21:26:28 - Systems & servers data update completed

. 2018.03.11 21:36:40 - Updating systems & servers data ...

. 2018.03.11 21:36:43 - Systems & servers data update completed

. 2018.03.11 21:59:26 - Updating systems & servers data ...

. 2018.03.11 21:59:31 - Systems & servers data update completed

. 2018.03.11 22:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=13208309/-1 pkts=35758/0

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 22:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 22:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 22:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 22:27:00 - Updating systems & servers data ...

. 2018.03.11 22:27:13 - Systems & servers data update completed

. 2018.03.11 22:56:58 - Updating systems & servers data ...

. 2018.03.11 22:57:11 - Systems & servers data update completed

. 2018.03.11 23:14:26 - Renewing TLS key

. 2018.03.11 23:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 23:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4729920/-1 pkts=18755/0

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 23:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 23:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 23:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 23:21:42 - Updating systems & servers data ...

. 2018.03.11 23:21:52 - Systems & servers data update completed

. 2018.03.11 23:51:01 - Updating systems & servers data ...

. 2018.03.11 23:51:13 - Systems & servers data update completed

. 2018.03.12 00:14:26 - Renewing TLS key

. 2018.03.12 00:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 00:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=3709161/-1 pkts=15821/0

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 00:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 00:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 00:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 00:16:51 - Updating systems & servers data ...

. 2018.03.12 00:17:03 - Systems & servers data update completed

. 2018.03.12 00:47:00 - Updating systems & servers data ...

. 2018.03.12 00:47:05 - Systems & servers data update completed

. 2018.03.12 01:06:42 - Updating systems & servers data ...

. 2018.03.12 01:06:46 - Systems & servers data update completed

. 2018.03.12 01:14:26 - Renewing TLS key

. 2018.03.12 01:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 01:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=5011675/-1 pkts=20213/0

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 01:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 01:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 01:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 01:35:26 - Updating systems & servers data ...

. 2018.03.12 01:35:37 - Systems & servers data update completed

. 2018.03.12 02:04:46 - Updating systems & servers data ...

. 2018.03.12 02:14:24 - OpenVPN > TLS: soft reset sec=0 bytes=4579617/-1 pkts=19162/0

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 02:14:24 - OpenVPN > VERIFY KU OK

. 2018.03.12 02:14:24 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 02:14:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 02:14:24 - OpenVPN > VERIFY EKU OK

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 03:14:24 - Renewing TLS key

. 2018.03.12 03:14:24 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 03:14:25 - OpenVPN > VERIFY KU OK

. 2018.03.12 03:14:25 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 03:14:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 03:14:25 - OpenVPN > VERIFY EKU OK

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 04:14:25 - Renewing TLS key

. 2018.03.12 04:14:25 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 04:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4289468/-1 pkts=17966/0

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 04:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 04:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 04:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 05:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4133956/-1 pkts=17253/0

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 05:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 05:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 05:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 06:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4318074/-1 pkts=17867/0

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 06:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 06:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 06:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4527903/-1 pkts=18303/0

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:28:58 - Cannot retrieve systems & servers data. (Length of the data to decrypt is invalid. - Status: HTTP/1.1 502 Bad Gateway - Headers: server:nginx;date:Mon, 12 Mar 2018 09:04:47 GMT;content-type:text/html;content-length:1533;connection:keep-alive;etag:"5364e4bd-5fd"; - Body (1533 bytes): <!DOCTYPE HTML>

. 2018.03.12 07:28:58 -     <html>

. 2018.03.12 07:28:58 -     <body style="background-color:#EEEEEE;padding:0px;margin:0px;font-size:1.3em;font-family:Verdana,Arial;">

. 2018.03.12 07:28:58 -     <div style="height:80px; background-color: #5F7DAB; background-image: url('/error/header_gradient.png');background-repeat: repeat-x; font-size:1.0em">

. 2018.03.12 07:28:58 -     <img style="vertical-align: middle;" src="/error/header.png">

. 2018.03.12 07:28:58 -     <div style="float:right;padding-right:30px;padding-top:20px;color:white;font-size:1.5em;">We're sorry, our tubes are clogged up.</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <div style="clear:both;text-align:center;">

. 2018.03.12 07:28:58 -     <div style="margin:auto;padding:50px;width:900px;background-color:white;box-shadow: 0 0 20px #888;">

. 2018.03.12 07:28:58 -     <div style="float:right;margin:5px;width:400px;">

. 2018.03.12 07:28:58 -     <a class="twitter-timeline"  href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn" data-widget-id="259385580377481216">Tweets di @airvpn</a>

. 2018.03.12 07:28:58 -     <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <p></p>

. 2018.03.12 07:28:58 -     <p>We're sorry, our tubes are clogged up.</p>

. 2018.03.12 07:28:58 -     <p>We're working to deliver more tubes on a bigger truck and solve the problem.</p>

. 2018.03.12 07:28:58 -     <p>Please see <a href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn">https://twitter.com/airvpn</a> for information and updates in the meantime.</p>

. 2018.03.12 07:28:58 -     <img style="margin-top:100px;" src="/error/tubes.jpg">

. 2018.03.12 07:28:58 -     <div style="clear:both;font-size:0.4em;margin-top:50px;color:gray">Backend LU</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </body>

. 2018.03.12 07:28:58 -     </html> )

. 2018.03.12 07:30:00 - Updating systems & servers data ...

. 2018.03.12 07:30:02 - Systems & servers data update completed

. 2018.03.12 07:40:15 - Updating systems & servers data ...

. 2018.03.12 07:40:17 - Systems & servers data update completed

. 2018.03.12 07:50:26 - Updating systems & servers data ...

. 2018.03.12 07:50:28 - Systems & servers data update completed

. 2018.03.12 07:58:35 - macOS - PF rules updated, reloading

! 2018.03.12 07:58:36 - Disconnecting

. 2018.03.12 07:58:37 - Routes, removed a route previously added, 71.19.252.114 for gateway 10.4.0.1

. 2018.03.12 07:58:37 - Sending management termination signal

. 2018.03.12 07:58:37 - Management - Send 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:42 - OpenVPN > delete net 71.19.252.113: gateway 192.168.1.254

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > Closing TUN/TAP interface

. 2018.03.12 07:58:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.12 07:58:42 - Connection terminated.

. 2018.03.12 07:58:45 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Ethernet)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (FireWire)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.03.12 07:58:49 - Checking authorization ...

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (FireWire)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.03.12 07:58:51 - Connecting to Aquila (United States, Fremont, California)

. 2018.03.12 07:58:51 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.12 07:58:51 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.12 07:58:51 - Connection to OpenVPN Management Interface

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.03.12 07:58:51 - OpenVPN > UDP link local: (not bound)

. 2018.03.12 07:58:51 - OpenVPN > UDP link remote: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.223.129:443, sid=a0b4f7a6 ec046c0e

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:58:51 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:58:51 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:58:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:58:51 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 07:58:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:58:52 - OpenVPN > [Aquila] Peer Connection Initiated with [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:53 - OpenVPN > SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1)

. 2018.03.12 07:58:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.157 255.255.0.0,peer-id 26,cipher AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.12 07:58:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.03.12 07:58:53 - OpenVPN > Opened utun device utun0

. 2018.03.12 07:58:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.03.12 07:58:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.12 07:58:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 10.4.2.157 10.4.2.157 netmask 255.255.0.0 mtu 1500 up

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.157 255.255.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.157

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 199.249.223.129 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:53 - OpenVPN > add net 199.249.223.129: gateway 192.168.1.254

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - Routes, added a new route, 199.249.223.130 for gateway 10.4.0.1

. 2018.03.12 07:58:54 - Flushing DNS

. 2018.03.12 07:58:54 - macOS - PF rules updated, reloading

I 2018.03.12 07:58:55 - Checking route IPv4

I 2018.03.12 07:58:56 - Checking DNS

! 2018.03.12 07:58:57 - Connected.

. 2018.03.12 07:58:57 - OpenVPN > Initialization Sequence Completed

. 2018.03.12 08:00:39 - Updating systems & servers data ...

. 2018.03.12 08:00:42 - Systems & servers data update completed

. 2018.03.12 08:10:55 - Updating systems & servers data ...

. 2018.03.12 08:10:57 - Systems & servers data update completed

. 2018.03.12 08:21:10 - Updating systems & servers data ...

. 2018.03.12 08:21:13 - Systems & servers data update completed

. 2018.03.12 08:31:20 - Updating systems & servers data ...

. 2018.03.12 08:31:23 - Systems & servers data update completed

. 2018.03.12 08:41:30 - Updating systems & servers data ...

. 2018.03.12 08:41:33 - Systems & servers data update completed

. 2018.03.12 08:51:39 - Updating systems & servers data ...

. 2018.03.12 08:51:42 - Systems & servers data update completed

. 2018.03.12 08:58:52 - OpenVPN > TLS: soft reset sec=0 bytes=3450446668/-1 pkts=4929422/0

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 08:58:52 - OpenVPN > VERIFY KU OK

. 2018.03.12 08:58:52 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 08:58:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 08:58:52 - OpenVPN > VERIFY EKU OK

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 08:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 09:01:46 - Updating systems & servers data ...

. 2018.03.12 09:01:51 - Systems & servers data update completed

. 2018.03.12 09:11:55 - Updating systems & servers data ...

. 2018.03.12 09:12:05 - Systems & servers data update completed

. 2018.03.12 09:22:20 - Updating systems & servers data ...

. 2018.03.12 09:22:28 - Systems & servers data update completed

. 2018.03.12 09:32:35 - Updating systems & servers data ...

. 2018.03.12 09:32:37 - Systems & servers data update completed

 

System log:

Eddie System/Environment Report - 3/12/2018 4:41 PM UTC

 

Eddie version: 2.14.2

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.11.6

OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.43.0 (/usr/bin/curl)

Profile path: /Users/madrat/.airvpn/AirVPN.xml

Data path: /Users/madrat/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Aquila

Detected DNS: 10.4.0.1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 45 ms

Test Ping IPv6: -1 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Error:curl: (7) Couldn't connect to server

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

connect: True

netlock: True

mode.protocol: SSL

mode.alt: 1

openvpn.management_port: 3101

 

----------------------------

Logs:

 

. 2018.03.10 10:14:11 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 10:14:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 10:20:23 - Updating systems & servers data ...

. 2018.03.10 10:20:26 - Systems & servers data update completed

. 2018.03.10 10:30:37 - Updating systems & servers data ...

. 2018.03.10 10:30:40 - Systems & servers data update completed

. 2018.03.10 10:40:53 - Updating systems & servers data ...

. 2018.03.10 10:40:56 - Systems & servers data update completed

. 2018.03.10 10:51:01 - Updating systems & servers data ...

. 2018.03.10 10:51:03 - Systems & servers data update completed

. 2018.03.10 11:01:08 - Updating systems & servers data ...

. 2018.03.10 11:01:11 - Systems & servers data update completed

. 2018.03.10 11:11:17 - Updating systems & servers data ...

. 2018.03.10 11:11:19 - Systems & servers data update completed

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 11:14:11 - OpenVPN > VERIFY KU OK

. 2018.03.10 11:14:11 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 11:14:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 11:14:11 - OpenVPN > VERIFY EKU OK

. 2018.03.10 11:14:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 11:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 11:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 11:21:26 - Updating systems & servers data ...

. 2018.03.10 11:21:29 - Systems & servers data update completed

. 2018.03.10 11:31:39 - Updating systems & servers data ...

. 2018.03.10 11:31:43 - Systems & servers data update completed

. 2018.03.10 11:41:49 - Updating systems & servers data ...

. 2018.03.10 11:41:54 - Systems & servers data update completed

. 2018.03.10 11:52:00 - Updating systems & servers data ...

. 2018.03.10 11:52:03 - Systems & servers data update completed

. 2018.03.10 12:02:11 - Updating systems & servers data ...

. 2018.03.10 12:02:13 - Systems & servers data update completed

. 2018.03.10 12:12:20 - Updating systems & servers data ...

. 2018.03.10 12:12:23 - Systems & servers data update completed

. 2018.03.10 12:14:11 - Renewing TLS key

. 2018.03.10 12:14:11 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > VERIFY KU OK

. 2018.03.10 12:14:12 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 12:14:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 12:14:12 - OpenVPN > VERIFY EKU OK

. 2018.03.10 12:14:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 12:14:12 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 12:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 12:22:28 - Updating systems & servers data ...

. 2018.03.10 12:22:31 - Systems & servers data update completed

. 2018.03.10 12:32:36 - Updating systems & servers data ...

. 2018.03.10 12:32:44 - Systems & servers data update completed

. 2018.03.10 12:42:48 - Updating systems & servers data ...

. 2018.03.10 12:42:51 - Systems & servers data update completed

. 2018.03.10 12:53:03 - Updating systems & servers data ...

. 2018.03.10 12:53:08 - Systems & servers data update completed

. 2018.03.10 13:03:15 - Updating systems & servers data ...

. 2018.03.10 13:03:19 - Systems & servers data update completed

. 2018.03.10 13:13:24 - Updating systems & servers data ...

. 2018.03.10 13:13:27 - Systems & servers data update completed

. 2018.03.10 13:14:12 - OpenVPN > TLS: soft reset sec=0 bytes=11428602/-1 pkts=27756/0

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 13:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 13:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 13:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 13:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 13:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 13:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 13:23:33 - Updating systems & servers data ...

. 2018.03.10 13:23:36 - Systems & servers data update completed

. 2018.03.10 13:34:26 - Updating systems & servers data ...

. 2018.03.10 13:34:33 - Systems & servers data update completed

. 2018.03.10 13:44:38 - Updating systems & servers data ...

. 2018.03.10 13:44:42 - Systems & servers data update completed

. 2018.03.10 13:54:47 - Updating systems & servers data ...

. 2018.03.10 13:54:51 - Systems & servers data update completed

. 2018.03.10 14:04:57 - Updating systems & servers data ...

. 2018.03.10 14:05:03 - Systems & servers data update completed

. 2018.03.10 14:14:12 - Renewing TLS key

. 2018.03.10 14:14:12 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 14:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=4261915/-1 pkts=16397/0

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 14:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 14:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 14:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 14:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 14:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 14:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 14:15:09 - Updating systems & servers data ...

. 2018.03.10 14:15:13 - Systems & servers data update completed

. 2018.03.10 14:25:28 - Updating systems & servers data ...

. 2018.03.10 14:25:31 - Systems & servers data update completed

. 2018.03.10 14:35:45 - Updating systems & servers data ...

. 2018.03.10 14:35:50 - Systems & servers data update completed

. 2018.03.10 14:45:55 - Updating systems & servers data ...

. 2018.03.10 14:45:59 - Systems & servers data update completed

. 2018.03.10 14:56:04 - Updating systems & servers data ...

. 2018.03.10 14:56:12 - Systems & servers data update completed

. 2018.03.10 15:06:25 - Updating systems & servers data ...

. 2018.03.10 15:06:28 - Systems & servers data update completed

. 2018.03.10 15:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=29362742/-1 pkts=56917/0

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 15:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 15:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 15:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 15:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 15:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 15:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 15:16:40 - Updating systems & servers data ...

. 2018.03.10 15:16:43 - Systems & servers data update completed

. 2018.03.10 15:41:08 - Updating systems & servers data ...

. 2018.03.10 15:41:20 - Systems & servers data update completed

. 2018.03.10 15:51:44 - Updating systems & servers data ...

. 2018.03.10 15:51:53 - Systems & servers data update completed

. 2018.03.10 16:02:07 - Updating systems & servers data ...

. 2018.03.10 16:02:12 - Systems & servers data update completed

. 2018.03.10 16:12:20 - Updating systems & servers data ...

. 2018.03.10 16:12:23 - Systems & servers data update completed

. 2018.03.10 16:14:14 - OpenVPN > TLS: soft reset sec=0 bytes=16284033/-1 pkts=34367/0

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 16:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 16:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 16:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 16:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 16:14:14 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 16:14:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 16:22:28 - Updating systems & servers data ...

. 2018.03.10 16:22:30 - Systems & servers data update completed

. 2018.03.10 16:32:35 - Updating systems & servers data ...

. 2018.03.10 16:32:44 - Systems & servers data update completed

. 2018.03.10 16:42:49 - Updating systems & servers data ...

. 2018.03.10 16:42:52 - Systems & servers data update completed

. 2018.03.10 16:52:57 - Updating systems & servers data ...

. 2018.03.10 16:53:00 - Systems & servers data update completed

. 2018.03.10 17:03:14 - Updating systems & servers data ...

. 2018.03.10 17:03:16 - Systems & servers data update completed

. 2018.03.10 17:13:22 - Updating systems & servers data ...

. 2018.03.10 17:13:25 - Systems & servers data update completed

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 17:14:14 - OpenVPN > VERIFY KU OK

. 2018.03.10 17:14:14 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 17:14:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 17:14:14 - OpenVPN > VERIFY EKU OK

. 2018.03.10 17:14:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 17:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 17:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 17:23:36 - Updating systems & servers data ...

. 2018.03.10 17:23:39 - Systems & servers data update completed

. 2018.03.10 17:33:48 - Updating systems & servers data ...

. 2018.03.10 17:33:51 - Systems & servers data update completed

. 2018.03.10 17:43:56 - Updating systems & servers data ...

. 2018.03.10 17:43:58 - Systems & servers data update completed

. 2018.03.10 17:54:03 - Updating systems & servers data ...

. 2018.03.10 17:54:06 - Systems & servers data update completed

. 2018.03.10 18:04:11 - Updating systems & servers data ...

. 2018.03.10 18:04:14 - Systems & servers data update completed

. 2018.03.10 18:14:14 - Renewing TLS key

. 2018.03.10 18:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 18:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 18:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 18:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 18:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 18:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 18:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 18:14:19 - Updating systems & servers data ...

. 2018.03.10 18:14:22 - Systems & servers data update completed

. 2018.03.10 18:42:42 - Updating systems & servers data ...

. 2018.03.10 18:42:55 - Systems & servers data update completed

. 2018.03.10 19:08:00 - Updating systems & servers data ...

. 2018.03.10 19:08:06 - Systems & servers data update completed

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.10 19:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 19:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 19:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.10 19:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 19:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 19:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 19:19:24 - Updating systems & servers data ...

. 2018.03.10 19:19:26 - Systems & servers data update completed

. 2018.03.10 19:33:22 - Updating systems & servers data ...

. 2018.03.10 19:33:28 - Systems & servers data update completed

. 2018.03.10 20:01:00 - Updating systems & servers data ...

. 2018.03.10 20:01:14 - Systems & servers data update completed

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 20:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 20:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 20:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 20:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 20:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 20:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 20:14:19 - Updating systems & servers data ...

. 2018.03.10 20:14:25 - Systems & servers data update completed

. 2018.03.10 20:24:41 - Updating systems & servers data ...

. 2018.03.10 20:24:43 - Systems & servers data update completed

. 2018.03.10 20:34:48 - Updating systems & servers data ...

. 2018.03.10 20:34:50 - Systems & servers data update completed

. 2018.03.10 20:44:55 - Updating systems & servers data ...

. 2018.03.10 20:44:58 - Systems & servers data update completed

. 2018.03.10 20:55:03 - Updating systems & servers data ...

. 2018.03.10 20:55:05 - Systems & servers data update completed

. 2018.03.10 21:05:10 - Updating systems & servers data ...

. 2018.03.10 21:05:13 - Systems & servers data update completed

. 2018.03.10 21:14:14 - Renewing TLS key

. 2018.03.10 21:14:14 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > VERIFY KU OK

. 2018.03.10 21:14:15 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 21:14:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 21:14:15 - OpenVPN > VERIFY EKU OK

. 2018.03.10 21:14:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 21:14:15 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 21:14:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 21:15:18 - Updating systems & servers data ...

. 2018.03.10 21:15:23 - Systems & servers data update completed

. 2018.03.10 21:36:01 - Updating systems & servers data ...

. 2018.03.10 21:36:17 - Systems & servers data update completed

. 2018.03.10 22:05:08 - Updating systems & servers data ...

. 2018.03.10 22:05:11 - Systems & servers data update completed

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > VERIFY KU OK

. 2018.03.10 22:14:19 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 22:14:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 22:14:19 - OpenVPN > VERIFY EKU OK

. 2018.03.10 22:14:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 22:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 22:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 22:33:38 - Updating systems & servers data ...

. 2018.03.10 22:33:51 - Systems & servers data update completed

. 2018.03.10 23:07:32 - Updating systems & servers data ...

. 2018.03.10 23:08:00 - Systems & servers data update completed

. 2018.03.10 23:14:20 - OpenVPN > TLS: soft reset sec=0 bytes=267439940/-1 pkts=492179/0

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.10 23:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.10 23:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.10 23:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.10 23:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.10 23:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.10 23:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.10 23:40:12 - Updating systems & servers data ...

. 2018.03.10 23:40:23 - Systems & servers data update completed

. 2018.03.11 00:11:56 - Updating systems & servers data ...

. 2018.03.11 00:12:00 - Systems & servers data update completed

. 2018.03.11 00:14:22 - OpenVPN > TLS: soft reset sec=0 bytes=3248013/-1 pkts=13978/0

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > VERIFY KU OK

. 2018.03.11 00:14:22 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 00:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 00:14:22 - OpenVPN > VERIFY EKU OK

. 2018.03.11 00:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 00:14:22 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 00:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 00:41:42 - Updating systems & servers data ...

. 2018.03.11 00:41:54 - Systems & servers data update completed

. 2018.03.11 01:11:46 - Updating systems & servers data ...

. 2018.03.11 01:11:51 - Systems & servers data update completed

. 2018.03.11 01:14:17 - OpenVPN > TLS: soft reset sec=0 bytes=3632647/-1 pkts=14731/0

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > VERIFY KU OK

. 2018.03.11 01:14:17 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 01:14:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 01:14:17 - OpenVPN > VERIFY EKU OK

. 2018.03.11 01:14:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 01:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 01:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 01:37:00 - Updating systems & servers data ...

. 2018.03.11 01:37:16 - Systems & servers data update completed

. 2018.03.11 03:14:27 - Renewing TLS key

. 2018.03.11 03:14:27 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 03:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3466857/-1 pkts=14682/0

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 03:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 03:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 03:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 03:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 03:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 03:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 03:17:01 - Updating systems & servers data ...

. 2018.03.11 03:17:06 - Systems & servers data update completed

. 2018.03.11 03:58:00 - Updating systems & servers data ...

. 2018.03.11 03:58:05 - Systems & servers data update completed

. 2018.03.11 04:14:27 - OpenVPN > TLS: soft reset sec=0 bytes=3915096/-1 pkts=15788/0

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > VERIFY KU OK

. 2018.03.11 04:14:27 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 04:14:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 04:14:27 - OpenVPN > VERIFY EKU OK

. 2018.03.11 04:14:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 04:14:27 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 04:14:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 04:40:00 - Updating systems & servers data ...

. 2018.03.11 04:40:22 - Systems & servers data update completed

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 05:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 05:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 05:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 05:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 05:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 05:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 05:20:41 - Updating systems & servers data ...

. 2018.03.11 05:21:00 - Systems & servers data update completed

. 2018.03.11 05:36:06 - Updating systems & servers data ...

. 2018.03.11 05:36:10 - Systems & servers data update completed

. 2018.03.11 05:46:21 - Updating systems & servers data ...

. 2018.03.11 05:46:24 - Systems & servers data update completed

. 2018.03.11 05:56:37 - Updating systems & servers data ...

. 2018.03.11 05:56:39 - Systems & servers data update completed

. 2018.03.11 06:06:47 - Updating systems & servers data ...

. 2018.03.11 06:06:51 - Systems & servers data update completed

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 06:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 06:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 06:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 06:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 06:14:16 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 06:14:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 06:16:59 - Updating systems & servers data ...

. 2018.03.11 06:17:02 - Systems & servers data update completed

. 2018.03.11 06:27:09 - Updating systems & servers data ...

. 2018.03.11 06:27:11 - Systems & servers data update completed

. 2018.03.11 06:37:23 - Updating systems & servers data ...

. 2018.03.11 06:37:25 - Systems & servers data update completed

. 2018.03.11 06:47:38 - Updating systems & servers data ...

. 2018.03.11 06:47:40 - Systems & servers data update completed

. 2018.03.11 06:57:49 - Updating systems & servers data ...

. 2018.03.11 06:57:52 - Systems & servers data update completed

. 2018.03.11 07:07:59 - Updating systems & servers data ...

. 2018.03.11 07:08:00 - Systems & servers data update completed

. 2018.03.11 07:14:16 - OpenVPN > TLS: soft reset sec=0 bytes=40452973/-1 pkts=66132/0

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 07:14:16 - OpenVPN > VERIFY KU OK

. 2018.03.11 07:14:16 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 07:14:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 07:14:16 - OpenVPN > VERIFY EKU OK

. 2018.03.11 07:14:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 07:14:17 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 07:14:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 07:18:06 - Updating systems & servers data ...

. 2018.03.11 07:18:08 - Systems & servers data update completed

. 2018.03.11 07:28:13 - Updating systems & servers data ...

. 2018.03.11 07:28:19 - Systems & servers data update completed

. 2018.03.11 07:38:25 - Updating systems & servers data ...

. 2018.03.11 07:38:27 - Systems & servers data update completed

. 2018.03.11 07:57:13 - Updating systems & servers data ...

. 2018.03.11 07:57:15 - Systems & servers data update completed

. 2018.03.11 08:14:18 - Renewing TLS key

. 2018.03.11 08:14:18 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 08:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 08:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 08:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 08:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 08:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 08:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 08:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 08:14:56 - Updating systems & servers data ...

. 2018.03.11 08:15:04 - Systems & servers data update completed

. 2018.03.11 08:25:16 - Updating systems & servers data ...

. 2018.03.11 08:25:18 - Systems & servers data update completed

. 2018.03.11 08:35:26 - Updating systems & servers data ...

. 2018.03.11 08:35:28 - Systems & servers data update completed

. 2018.03.11 08:45:34 - Updating systems & servers data ...

. 2018.03.11 08:45:38 - Systems & servers data update completed

. 2018.03.11 08:55:49 - Updating systems & servers data ...

. 2018.03.11 08:55:51 - Systems & servers data update completed

. 2018.03.11 09:05:58 - Updating systems & servers data ...

. 2018.03.11 09:06:01 - Systems & servers data update completed

. 2018.03.11 09:14:17 - Renewing TLS key

. 2018.03.11 09:14:17 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 09:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=36221158/-1 pkts=59303/0

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 09:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 09:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 09:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 09:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 09:14:18 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 09:14:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 09:16:09 - Updating systems & servers data ...

. 2018.03.11 09:16:11 - Systems & servers data update completed

. 2018.03.11 09:26:21 - Updating systems & servers data ...

. 2018.03.11 09:26:24 - Systems & servers data update completed

. 2018.03.11 09:36:31 - Updating systems & servers data ...

. 2018.03.11 09:36:34 - Systems & servers data update completed

. 2018.03.11 09:46:39 - Updating systems & servers data ...

. 2018.03.11 09:46:42 - Systems & servers data update completed

. 2018.03.11 09:56:48 - Updating systems & servers data ...

. 2018.03.11 09:56:49 - Systems & servers data update completed

. 2018.03.11 10:06:56 - Updating systems & servers data ...

. 2018.03.11 10:06:59 - Systems & servers data update completed

. 2018.03.11 10:14:18 - OpenVPN > TLS: soft reset sec=0 bytes=12504721/-1 pkts=29323/0

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 10:14:18 - OpenVPN > VERIFY KU OK

. 2018.03.11 10:14:18 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 10:14:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 10:14:18 - OpenVPN > VERIFY EKU OK

. 2018.03.11 10:14:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 10:14:19 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 10:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 10:17:07 - Updating systems & servers data ...

. 2018.03.11 10:17:11 - Systems & servers data update completed

. 2018.03.11 10:27:18 - Updating systems & servers data ...

. 2018.03.11 10:27:20 - Systems & servers data update completed

. 2018.03.11 10:37:25 - Updating systems & servers data ...

. 2018.03.11 10:37:29 - Systems & servers data update completed

. 2018.03.11 10:47:34 - Updating systems & servers data ...

. 2018.03.11 10:47:37 - Systems & servers data update completed

. 2018.03.11 10:57:42 - Updating systems & servers data ...

. 2018.03.11 10:57:45 - Systems & servers data update completed

. 2018.03.11 11:14:28 - Renewing TLS key

. 2018.03.11 11:14:28 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 11:14:28 - OpenVPN > TLS: soft reset sec=0 bytes=6348225/-1 pkts=19902/0

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > VERIFY KU OK

. 2018.03.11 11:14:28 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 11:14:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 11:14:28 - OpenVPN > VERIFY EKU OK

. 2018.03.11 11:14:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 11:14:28 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 11:14:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 11:31:51 - Updating systems & servers data ...

. 2018.03.11 11:31:54 - Systems & servers data update completed

. 2018.03.11 11:41:53 - Updating systems & servers data ...

. 2018.03.11 11:41:59 - Systems & servers data update completed

. 2018.03.11 11:52:07 - Updating systems & servers data ...

. 2018.03.11 11:52:12 - Systems & servers data update completed

. 2018.03.11 12:02:23 - Updating systems & servers data ...

. 2018.03.11 12:02:27 - Systems & servers data update completed

. 2018.03.11 12:12:36 - Updating systems & servers data ...

. 2018.03.11 12:12:39 - Systems & servers data update completed

. 2018.03.11 12:14:19 - Renewing TLS key

. 2018.03.11 12:14:19 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 12:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 12:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 12:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 12:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 12:14:20 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 12:14:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 12:22:49 - Updating systems & servers data ...

. 2018.03.11 12:22:52 - Systems & servers data update completed

. 2018.03.11 12:33:01 - Updating systems & servers data ...

. 2018.03.11 12:33:04 - Systems & servers data update completed

. 2018.03.11 12:43:14 - Updating systems & servers data ...

. 2018.03.11 12:43:17 - Systems & servers data update completed

. 2018.03.11 12:53:25 - Updating systems & servers data ...

. 2018.03.11 12:53:27 - Systems & servers data update completed

. 2018.03.11 13:03:32 - Updating systems & servers data ...

. 2018.03.11 13:03:36 - Systems & servers data update completed

. 2018.03.11 13:13:41 - Updating systems & servers data ...

. 2018.03.11 13:13:43 - Systems & servers data update completed

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 13:14:20 - OpenVPN > VERIFY KU OK

. 2018.03.11 13:14:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 13:14:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 13:14:20 - OpenVPN > VERIFY EKU OK

. 2018.03.11 13:14:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 13:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 13:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 13:23:50 - Updating systems & servers data ...

. 2018.03.11 13:23:54 - Systems & servers data update completed

. 2018.03.11 13:33:59 - Updating systems & servers data ...

. 2018.03.11 13:34:01 - Systems & servers data update completed

. 2018.03.11 13:44:06 - Updating systems & servers data ...

. 2018.03.11 13:44:08 - Systems & servers data update completed

. 2018.03.11 13:54:14 - Updating systems & servers data ...

. 2018.03.11 13:54:16 - Systems & servers data update completed

. 2018.03.11 14:04:28 - Updating systems & servers data ...

. 2018.03.11 14:04:30 - Systems & servers data update completed

. 2018.03.11 14:14:20 - Renewing TLS key

. 2018.03.11 14:14:20 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 14:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=18715784/-1 pkts=33804/0

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 14:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 14:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 14:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 14:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 14:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 14:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 14:14:37 - Updating systems & servers data ...

. 2018.03.11 14:14:42 - Systems & servers data update completed

. 2018.03.11 14:24:47 - Updating systems & servers data ...

. 2018.03.11 14:24:50 - Systems & servers data update completed

. 2018.03.11 14:34:58 - Updating systems & servers data ...

. 2018.03.11 14:35:01 - Systems & servers data update completed

. 2018.03.11 14:45:09 - Updating systems & servers data ...

. 2018.03.11 14:45:12 - Systems & servers data update completed

. 2018.03.11 14:55:19 - Updating systems & servers data ...

. 2018.03.11 14:55:21 - Systems & servers data update completed

. 2018.03.11 15:05:32 - Updating systems & servers data ...

. 2018.03.11 15:05:35 - Systems & servers data update completed

. 2018.03.11 15:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=168183365/-1 pkts=248680/0

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 15:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 15:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 15:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 15:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 15:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 15:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 15:15:41 - Updating systems & servers data ...

. 2018.03.11 15:15:43 - Systems & servers data update completed

. 2018.03.11 15:25:48 - Updating systems & servers data ...

. 2018.03.11 15:25:50 - Systems & servers data update completed

. 2018.03.11 15:35:57 - Updating systems & servers data ...

. 2018.03.11 15:36:01 - Systems & servers data update completed

. 2018.03.11 15:46:10 - Updating systems & servers data ...

. 2018.03.11 15:46:12 - Systems & servers data update completed

. 2018.03.11 15:56:17 - Updating systems & servers data ...

. 2018.03.11 15:56:19 - Systems & servers data update completed

. 2018.03.11 16:06:24 - Updating systems & servers data ...

. 2018.03.11 16:06:27 - Systems & servers data update completed

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 16:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 16:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 16:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 16:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 16:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 16:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 16:16:32 - Updating systems & servers data ...

. 2018.03.11 16:16:38 - Systems & servers data update completed

. 2018.03.11 16:26:44 - Updating systems & servers data ...

. 2018.03.11 16:26:48 - Systems & servers data update completed

. 2018.03.11 16:36:57 - Updating systems & servers data ...

. 2018.03.11 16:36:59 - Systems & servers data update completed

. 2018.03.11 16:47:08 - Updating systems & servers data ...

. 2018.03.11 16:47:11 - Systems & servers data update completed

. 2018.03.11 16:57:21 - Updating systems & servers data ...

. 2018.03.11 16:57:24 - Systems & servers data update completed

. 2018.03.11 17:07:36 - Updating systems & servers data ...

. 2018.03.11 17:07:40 - Systems & servers data update completed

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 17:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 17:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 17:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 17:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 17:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 17:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 17:17:45 - Updating systems & servers data ...

. 2018.03.11 17:17:50 - Systems & servers data update completed

. 2018.03.11 17:27:57 - Updating systems & servers data ...

. 2018.03.11 17:28:01 - Systems & servers data update completed

. 2018.03.11 17:38:06 - Updating systems & servers data ...

. 2018.03.11 17:38:09 - Systems & servers data update completed

. 2018.03.11 17:48:16 - Updating systems & servers data ...

. 2018.03.11 17:48:19 - Systems & servers data update completed

. 2018.03.11 17:58:27 - Updating systems & servers data ...

. 2018.03.11 17:58:29 - Systems & servers data update completed

. 2018.03.11 18:08:34 - Updating systems & servers data ...

. 2018.03.11 18:08:37 - Systems & servers data update completed

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 18:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 18:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 18:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 18:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 18:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 18:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 18:18:43 - Updating systems & servers data ...

. 2018.03.11 18:18:46 - Systems & servers data update completed

. 2018.03.11 18:28:53 - Updating systems & servers data ...

. 2018.03.11 18:28:55 - Systems & servers data update completed

. 2018.03.11 18:39:06 - Updating systems & servers data ...

. 2018.03.11 18:39:09 - Systems & servers data update completed

. 2018.03.11 18:49:21 - Updating systems & servers data ...

. 2018.03.11 18:49:26 - Systems & servers data update completed

. 2018.03.11 18:59:36 - Updating systems & servers data ...

. 2018.03.11 18:59:40 - Systems & servers data update completed

. 2018.03.11 19:09:45 - Updating systems & servers data ...

. 2018.03.11 19:09:51 - Systems & servers data update completed

. 2018.03.11 19:14:21 - OpenVPN > TLS: soft reset sec=0 bytes=36399159/-1 pkts=57275/0

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > VERIFY KU OK

. 2018.03.11 19:14:21 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 19:14:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 19:14:21 - OpenVPN > VERIFY EKU OK

. 2018.03.11 19:14:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 19:14:21 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 19:14:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 19:19:57 - Updating systems & servers data ...

. 2018.03.11 19:20:00 - Systems & servers data update completed

. 2018.03.11 19:30:07 - Updating systems & servers data ...

. 2018.03.11 19:30:10 - Systems & servers data update completed

. 2018.03.11 19:40:22 - Updating systems & servers data ...

. 2018.03.11 19:40:26 - Systems & servers data update completed

. 2018.03.11 20:05:15 - Updating systems & servers data ...

. 2018.03.11 20:05:26 - Systems & servers data update completed

. 2018.03.11 20:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=9771731/-1 pkts=21291/0

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 20:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 20:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 20:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 20:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 20:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 20:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 20:27:21 - Updating systems & servers data ...

. 2018.03.11 20:27:31 - Systems & servers data update completed

. 2018.03.11 20:45:37 - Updating systems & servers data ...

. 2018.03.11 20:45:48 - Systems & servers data update completed

. 2018.03.11 21:11:56 - Updating systems & servers data ...

. 2018.03.11 21:12:01 - Systems & servers data update completed

. 2018.03.11 21:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=384457896/-1 pkts=720153/0

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 21:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 21:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 21:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 21:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 21:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 21:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 21:26:24 - Updating systems & servers data ...

. 2018.03.11 21:26:28 - Systems & servers data update completed

. 2018.03.11 21:36:40 - Updating systems & servers data ...

. 2018.03.11 21:36:43 - Systems & servers data update completed

. 2018.03.11 21:59:26 - Updating systems & servers data ...

. 2018.03.11 21:59:31 - Systems & servers data update completed

. 2018.03.11 22:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=13208309/-1 pkts=35758/0

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 22:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 22:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 22:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 22:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 22:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 22:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 22:27:00 - Updating systems & servers data ...

. 2018.03.11 22:27:13 - Systems & servers data update completed

. 2018.03.11 22:56:58 - Updating systems & servers data ...

. 2018.03.11 22:57:11 - Systems & servers data update completed

. 2018.03.11 23:14:26 - Renewing TLS key

. 2018.03.11 23:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.11 23:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4729920/-1 pkts=18755/0

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.11 23:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.11 23:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.11 23:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.11 23:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.11 23:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.11 23:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.11 23:21:42 - Updating systems & servers data ...

. 2018.03.11 23:21:52 - Systems & servers data update completed

. 2018.03.11 23:51:01 - Updating systems & servers data ...

. 2018.03.11 23:51:13 - Systems & servers data update completed

. 2018.03.12 00:14:26 - Renewing TLS key

. 2018.03.12 00:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 00:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=3709161/-1 pkts=15821/0

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 00:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 00:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 00:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 00:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 00:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 00:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 00:16:51 - Updating systems & servers data ...

. 2018.03.12 00:17:03 - Systems & servers data update completed

. 2018.03.12 00:47:00 - Updating systems & servers data ...

. 2018.03.12 00:47:05 - Systems & servers data update completed

. 2018.03.12 01:06:42 - Updating systems & servers data ...

. 2018.03.12 01:06:46 - Systems & servers data update completed

. 2018.03.12 01:14:26 - Renewing TLS key

. 2018.03.12 01:14:26 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 01:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=5011675/-1 pkts=20213/0

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 01:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 01:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 01:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 01:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 01:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 01:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 01:35:26 - Updating systems & servers data ...

. 2018.03.12 01:35:37 - Systems & servers data update completed

. 2018.03.12 02:04:46 - Updating systems & servers data ...

. 2018.03.12 02:14:24 - OpenVPN > TLS: soft reset sec=0 bytes=4579617/-1 pkts=19162/0

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 02:14:24 - OpenVPN > VERIFY KU OK

. 2018.03.12 02:14:24 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 02:14:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 02:14:24 - OpenVPN > VERIFY EKU OK

. 2018.03.12 02:14:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 02:14:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 02:14:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 03:14:24 - Renewing TLS key

. 2018.03.12 03:14:24 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 03:14:25 - OpenVPN > VERIFY KU OK

. 2018.03.12 03:14:25 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 03:14:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 03:14:25 - OpenVPN > VERIFY EKU OK

. 2018.03.12 03:14:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 03:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 03:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 04:14:25 - Renewing TLS key

. 2018.03.12 04:14:25 - OpenVPN > TLS: tls_process: killed expiring key

. 2018.03.12 04:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4289468/-1 pkts=17966/0

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 04:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 04:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 04:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 04:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 04:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 04:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 05:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4133956/-1 pkts=17253/0

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 05:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 05:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 05:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 05:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 05:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 05:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 06:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4318074/-1 pkts=17867/0

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 06:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 06:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 06:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 06:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 06:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 06:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:14:26 - OpenVPN > TLS: soft reset sec=0 bytes=4527903/-1 pkts=18303/0

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:14:26 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:14:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:14:26 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:14:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.12 07:14:26 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:14:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:28:58 - Cannot retrieve systems & servers data. (Length of the data to decrypt is invalid. - Status: HTTP/1.1 502 Bad Gateway - Headers: server:nginx;date:Mon, 12 Mar 2018 09:04:47 GMT;content-type:text/html;content-length:1533;connection:keep-alive;etag:"5364e4bd-5fd"; - Body (1533 bytes): <!DOCTYPE HTML>

. 2018.03.12 07:28:58 -     <html>

. 2018.03.12 07:28:58 -     <body style="background-color:#EEEEEE;padding:0px;margin:0px;font-size:1.3em;font-family:Verdana,Arial;">

. 2018.03.12 07:28:58 -     <div style="height:80px; background-color: #5F7DAB; background-image: url('/error/header_gradient.png');background-repeat: repeat-x; font-size:1.0em">

. 2018.03.12 07:28:58 -     <img style="vertical-align: middle;" src="/error/header.png">

. 2018.03.12 07:28:58 -     <div style="float:right;padding-right:30px;padding-top:20px;color:white;font-size:1.5em;">We're sorry, our tubes are clogged up.</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <div style="clear:both;text-align:center;">

. 2018.03.12 07:28:58 -     <div style="margin:auto;padding:50px;width:900px;background-color:white;box-shadow: 0 0 20px #888;">

. 2018.03.12 07:28:58 -     <div style="float:right;margin:5px;width:400px;">

. 2018.03.12 07:28:58 -     <a class="twitter-timeline"  href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn" data-widget-id="259385580377481216">Tweets di @airvpn</a>

. 2018.03.12 07:28:58 -     <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     <p></p>

. 2018.03.12 07:28:58 -     <p>We're sorry, our tubes are clogged up.</p>

. 2018.03.12 07:28:58 -     <p>We're working to deliver more tubes on a bigger truck and solve the problem.</p>

. 2018.03.12 07:28:58 -     <p>Please see <a href="/external_link/?url=%3Ca+href%3D"https://twitter.com/airvpn" rel="external nofollow">https://twitter.com/airvpn">https://twitter.com/airvpn</a> for information and updates in the meantime.</p>

. 2018.03.12 07:28:58 -     <img style="margin-top:100px;" src="/error/tubes.jpg">

. 2018.03.12 07:28:58 -     <div style="clear:both;font-size:0.4em;margin-top:50px;color:gray">Backend LU</div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </div>

. 2018.03.12 07:28:58 -     </body>

. 2018.03.12 07:28:58 -     </html> )

. 2018.03.12 07:30:00 - Updating systems & servers data ...

. 2018.03.12 07:30:02 - Systems & servers data update completed

. 2018.03.12 07:40:15 - Updating systems & servers data ...

. 2018.03.12 07:40:17 - Systems & servers data update completed

. 2018.03.12 07:50:26 - Updating systems & servers data ...

. 2018.03.12 07:50:28 - Systems & servers data update completed

. 2018.03.12 07:58:35 - macOS - PF rules updated, reloading

! 2018.03.12 07:58:36 - Disconnecting

. 2018.03.12 07:58:37 - Routes, removed a route previously added, 71.19.252.114 for gateway 10.4.0.1

. 2018.03.12 07:58:37 - Sending management termination signal

. 2018.03.12 07:58:37 - Management - Send 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.12 07:58:37 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:42 - OpenVPN > delete net 71.19.252.113: gateway 192.168.1.254

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:42 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:42 - OpenVPN > Closing TUN/TAP interface

. 2018.03.12 07:58:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.12 07:58:42 - Connection terminated.

. 2018.03.12 07:58:45 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Ethernet)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (FireWire)

. 2018.03.12 07:58:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.03.12 07:58:49 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.03.12 07:58:49 - Checking authorization ...

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.03.12 07:58:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (FireWire)

. 2018.03.12 07:58:51 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.03.12 07:58:51 - Connecting to Aquila (United States, Fremont, California)

. 2018.03.12 07:58:51 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.12 07:58:51 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.12 07:58:51 - Connection to OpenVPN Management Interface

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.12 07:58:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.03.12 07:58:51 - OpenVPN > UDP link local: (not bound)

. 2018.03.12 07:58:51 - OpenVPN > UDP link remote: [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.03.12 07:58:51 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.223.129:443, sid=a0b4f7a6 ec046c0e

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 07:58:51 - OpenVPN > VERIFY KU OK

. 2018.03.12 07:58:51 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 07:58:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 07:58:51 - OpenVPN > VERIFY EKU OK

. 2018.03.12 07:58:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 07:58:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 07:58:52 - OpenVPN > [Aquila] Peer Connection Initiated with [AF_INET]199.249.223.129:443

. 2018.03.12 07:58:53 - OpenVPN > SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1)

. 2018.03.12 07:58:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.157 255.255.0.0,peer-id 26,cipher AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.12 07:58:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.12 07:58:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.12 07:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 07:58:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.03.12 07:58:53 - OpenVPN > Opened utun device utun0

. 2018.03.12 07:58:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.03.12 07:58:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.12 07:58:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.12 07:58:53 - OpenVPN > /sbin/ifconfig utun0 10.4.2.157 10.4.2.157 netmask 255.255.0.0 mtu 1500 up

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.157 255.255.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.157

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 199.249.223.129 192.168.1.254 255.255.255.255

. 2018.03.12 07:58:53 - OpenVPN > add net 199.249.223.129: gateway 192.168.1.254

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.12 07:58:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.12 07:58:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.12 07:58:54 - Routes, added a new route, 199.249.223.130 for gateway 10.4.0.1

. 2018.03.12 07:58:54 - Flushing DNS

. 2018.03.12 07:58:54 - macOS - PF rules updated, reloading

I 2018.03.12 07:58:55 - Checking route IPv4

I 2018.03.12 07:58:56 - Checking DNS

! 2018.03.12 07:58:57 - Connected.

. 2018.03.12 07:58:57 - OpenVPN > Initialization Sequence Completed

. 2018.03.12 08:00:39 - Updating systems & servers data ...

. 2018.03.12 08:00:42 - Systems & servers data update completed

. 2018.03.12 08:10:55 - Updating systems & servers data ...

. 2018.03.12 08:10:57 - Systems & servers data update completed

. 2018.03.12 08:21:10 - Updating systems & servers data ...

. 2018.03.12 08:21:13 - Systems & servers data update completed

. 2018.03.12 08:31:20 - Updating systems & servers data ...

. 2018.03.12 08:31:23 - Systems & servers data update completed

. 2018.03.12 08:41:30 - Updating systems & servers data ...

. 2018.03.12 08:41:33 - Systems & servers data update completed

. 2018.03.12 08:51:39 - Updating systems & servers data ...

. 2018.03.12 08:51:42 - Systems & servers data update completed

. 2018.03.12 08:58:52 - OpenVPN > TLS: soft reset sec=0 bytes=3450446668/-1 pkts=4929422/0

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.12 08:58:52 - OpenVPN > VERIFY KU OK

. 2018.03.12 08:58:52 - OpenVPN > Validating certificate extended key usage

. 2018.03.12 08:58:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.12 08:58:52 - OpenVPN > VERIFY EKU OK

. 2018.03.12 08:58:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org

. 2018.03.12 08:58:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.12 08:58:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.12 09:01:46 - Updating systems & servers data ...

. 2018.03.12 09:01:51 - Systems & servers data update completed

. 2018.03.12 09:11:55 - Updating systems & servers data ...

. 2018.03.12 09:12:05 - Systems & servers data update completed

. 2018.03.12 09:22:20 - Updating systems & servers data ...

. 2018.03.12 09:22:28 - Systems & servers data update completed

. 2018.03.12 09:32:35 - Updating systems & servers data ...

. 2018.03.12 09:32:37 - Systems & servers data update completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "108",

            "use": "1",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "621",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "10.0.0.4\/16",

            "gateway": "10.4.2.157",

            "flags": "UGSc",

            "refs": "3",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "10.4.2.157",

            "gateway": "10.4.2.157",

            "flags": "UH",

            "refs": "2",

            "use": "904",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "3",

            "use": "943294",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "83",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLWI",

            "refs": "0",

            "use": "1126",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "1c:af:f7:d9:72:db",

            "flags": "UHLWIir",

            "refs": "5",

            "use": "5840",

            "mtu": "1500",

            "interface": "en0",

            "expire": "1191"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "18",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "199.249.223.129",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "199.249.223.130",

            "gateway": "10.4.0.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "806",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "224.0.0.0",

            "gateway": "link#4",

            "flags": "UmCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.1",

            "gateway": "1:0:5e:0:0:1",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "56846",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "::1",

                "127.0.0.1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "192.168.1.65"

            ],

            "gateways": [

                "192.168.1.254"

            ],

            "bind": true

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "10.4.2.157"

            ],

            "gateways": [

                "10.4.0.1",

                "10.4.2.157"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en0"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=3<RXCSUM,TXCSUM>

    inet6 ::1 prefixlen 128

    inet 127.0.0.1 netmask 0xff000000

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=1<PERFORMNUD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>

    ether 00:23:df:8c:a0:ae

    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=1<PERFORMNUD>

    media: autoselect (100baseTX <full-duplex,flow-control>)

    status: active

en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500

    ether 00:1f:f3:bd:82:25

    nd6 options=1<PERFORMNUD>

    media: autoselect (<unknown type>)

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr 00:23:df:ff:fe:8c:a0:ae

    nd6 options=1<PERFORMNUD>

    media: autoselect <full-duplex>

    status: inactive

p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304

    ether 02:1f:f3:bd:82:25

    media: autoselect

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.4.2.157 --> 10.4.2.157 netmask 0xffff0000

Share this post


Link to post

I'm using Eddie 2.14.2 beta on Ubuntu 17.10 and I repeatedly encounter the following errors:

 

1.  It runs well as long as I don't minimize it: when I do, it invariably crashes, and leaves the process eddie_tray running which I cannot end, close, or kill: the only way to get rid of the process is to reboot.  As long as it is running I am unable to open Eddie again, as it informs me that it is already running.  This is reproducible every time I try it.

 

2.  If I try to go to the AirVPN webpage from within Eddie (hitting the AirVPN button then choosing Website from the menu), Eddie completely freezes.  The menu stays open but I can not choose any items, nor can I close Eddie - or anything else - in any manner.  I cannot open anything, either: the desktop completely locks up.  I can move the mouse cursor, but cannot interact with the desktop in any way: the only way out is to press the power button on the computer and shut it down.  This is mostly reproducible, but I can't be sure it happens 100% of the time.  (I can, however, reach the AirVPN website quite easily if I just don't try to get to it through Eddie.)

Share this post


Link to post

Hi Grindle222,

​To at least save a reboot, you can try killing mono and openvpn. If that doesn't work, the parent of eddie_tray is 'su' so you can also see if killing that helps.

​Cheers

Share this post


Link to post

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

Share this post


Link to post

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

 

Have you tried the portable mono version? This one works flawlessly for me in Arch Linux and it's wicked fast, much faster than the ppa version that I used in Ubuntu 16.04. The non-mono portable version on the other hand is slow as hell. I haven't tested the AUR version yet.

Share this post


Link to post

Greetings,

 

I'm running the Eddie beta (2.14.2) with Network Lock activated on a MacOS laptop (10.13.3), which I do have to close / put to sleep regularly.  Eddie sometimes has an issue reconnecting when I wake the laptop from it's slumbers.  It doesn't happen every time I wake the machine, but it does happen fairly often.

 

Here are some log entries that I grabbed recently when Eddie was unable to complete his IPv4 checks and finish connecting after I woke the laptop. Eddie seems to try about 3 times to reconnect and then disconnects and tries again, often still unsuccessfully.

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml
. 2018.03.22 07:38:30 - Command line arguments (0):
. 2018.03.22 07:38:32 - OpenVPN Driver - Expected
. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)
. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)
. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
W 2018.03.22 07:38:33 - Recovery. Unexpected crash?
. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1
! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
. 2018.03.22 07:38:33 - Updating systems & servers data ...
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:33 - Session starting.
. 2018.03.22 07:38:34 - Systems & servers data update completed
I 2018.03.22 07:38:39 - Checking authorization ...
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)
. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK
. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 07:38:42 - Above log line repeated 1 times more
. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2
. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 07:38:43 - Flushing DNS
. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:43 - Checking route IPv4
I 2018.03.22 07:38:44 - Checking DNS
! 2018.03.22 07:38:44 - Connected.
. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 07:48:40 - Updating systems & servers data ...
. 2018.03.22 07:48:42 - Systems & servers data update completed
. 2018.03.22 08:01:23 - Updating systems & servers data ...
. 2018.03.22 08:01:27 - Systems & servers data update completed
. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading
! 2018.03.22 10:01:37 - Disconnecting
. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 10:01:37 - Sending management termination signal
. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 10:01:37 - Connection terminated.
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.22 10:01:45 - Checking authorization ...
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK
. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'
. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 10:01:48 - Above log line repeated 1 times more
. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2
. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 10:01:49 - Flushing DNS
. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading
I 2018.03.22 10:01:50 - Checking route IPv4
I 2018.03.22 10:01:50 - Checking DNS
! 2018.03.22 10:01:50 - Connected.
. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading
! 2018.03.22 12:01:40 - Disconnecting
. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 12:01:40 - Sending management termination signal
. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 12:01:40 - Connection terminated.
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 12:01:41 - Updating systems & servers data ...
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2018.03.22 12:01:41 - Systems & servers data update completed
I 2018.03.22 12:01:46 - Checking authorization ...
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)
. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK
. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'
. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 12:01:51 - Above log line repeated 1 times more
. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2
. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.22 12:01:52 - Flushing DNS
. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading
I 2018.03.22 12:01:53 - Checking route IPv4
I 2018.03.22 12:01:53 - Checking DNS
! 2018.03.22 12:01:53 - Connected.
. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed
. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading
! 2018.03.24 07:51:56 - Disconnecting
. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.24 07:51:56 - Sending management termination signal
. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.24 07:51:56 - Connection terminated.
. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:00 - Checking authorization ...
W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)
. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:03 - Above log line repeated 1 times more
. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:04 - Flushing DNS
. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading
I 2018.03.24 07:52:05 - Checking route IPv4
I 2018.03.24 07:52:05 - Checking DNS
. 2018.03.24 07:52:06 - Checking DNS failed:
. 2018.03.24 07:52:06 - Checking DNS (2° try)
. 2018.03.24 07:52:07 - Checking DNS failed:
. 2018.03.24 07:52:07 - Checking DNS (3° try)
. 2018.03.24 07:52:10 - Checking DNS failed:
E 2018.03.24 07:52:10 - Checking DNS failed.
. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:52:10 - Disconnecting
. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:10 - Sending management termination signal
. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:52:13 - Updating systems & servers data ...
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:52:15 - Connection terminated.
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:19 - Checking authorization ...
. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)
. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:22 - Above log line repeated 1 times more
. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:52:23 - Flushing DNS
I 2018.03.24 07:52:23 - Checking route IPv4
. 2018.03.24 07:52:34 - Systems & servers data update completed
. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.03.24 07:52:43 - Checking route (2° try)
. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds
. 2018.03.24 07:53:04 - Checking route (3° try)
. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds
E 2018.03.24 07:53:26 - Checking route IPv4 failed.
. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:53:26 - Disconnecting
. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:53:26 - Sending management termination signal
. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:53:31 - Connection terminated.
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:53:35 - Checking authorization ...
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'
. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:53:38 - Above log line repeated 1 times more
. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1
. 2018.03.24 07:53:39 - Flushing DNS
I 2018.03.24 07:53:39 - Checking route IPv4
. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:53:59 - Checking route (2° try)

 

I've tried hitting "Cancel" on the main Eddie window, refreshing the servers list on the Servers tab, and then reconnecting to a recommended server.  This usually doesn't work either and results in the same issue with checking the IPv4 route.  Here's a batch of log entries from one of those attempts (cancel, refresh servers list, reconnect to recommended server).

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml
. 2018.03.22 07:38:30 - Command line arguments (0):
. 2018.03.22 07:38:32 - OpenVPN Driver - Expected
. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)
. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)
. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
W 2018.03.22 07:38:33 - Recovery. Unexpected crash?
. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1
! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
. 2018.03.22 07:38:33 - Updating systems & servers data ...
. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:33 - Session starting.
. 2018.03.22 07:38:34 - Systems & servers data update completed
I 2018.03.22 07:38:39 - Checking authorization ...
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)
. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK
. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK
. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443
. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 07:38:42 - Above log line repeated 1 times more
. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2
. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 07:38:43 - Flushing DNS
. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading
I 2018.03.22 07:38:43 - Checking route IPv4
I 2018.03.22 07:38:44 - Checking DNS
! 2018.03.22 07:38:44 - Connected.
. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 07:48:40 - Updating systems & servers data ...
. 2018.03.22 07:48:42 - Systems & servers data update completed
. 2018.03.22 08:01:23 - Updating systems & servers data ...
. 2018.03.22 08:01:27 - Systems & servers data update completed
. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading
! 2018.03.22 10:01:37 - Disconnecting
. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1
. 2018.03.22 10:01:37 - Sending management termination signal
. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 10:01:37 - Connection terminated.
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.22 10:01:45 - Checking authorization ...
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5
. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK
. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK
. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'
. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 10:01:48 - Above log line repeated 1 times more
. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2
. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 10:01:49 - Flushing DNS
. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading
I 2018.03.22 10:01:50 - Checking route IPv4
I 2018.03.22 10:01:50 - Checking DNS
! 2018.03.22 10:01:50 - Connected.
. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed
. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading
! 2018.03.22 12:01:40 - Disconnecting
. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1
. 2018.03.22 12:01:40 - Sending management termination signal
. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface
. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.22 12:01:40 - Connection terminated.
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.22 12:01:41 - Updating systems & servers data ...
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2018.03.22 12:01:41 - Systems & servers data update completed
I 2018.03.22 12:01:46 - Checking authorization ...
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)
. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)
. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e
. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK
. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage
. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK
. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443
. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'
. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.22 12:01:51 - Above log line repeated 1 times more
. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2
. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.22 12:01:52 - Flushing DNS
. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading
I 2018.03.22 12:01:53 - Checking route IPv4
I 2018.03.22 12:01:53 - Checking DNS
! 2018.03.22 12:01:53 - Connected.
. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed
. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)
. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading
! 2018.03.24 07:51:56 - Disconnecting
. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1
. 2018.03.24 07:51:56 - Sending management termination signal
. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255
. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.03.24 07:51:56 - Connection terminated.
. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:00 - Checking authorization ...
W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)
. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443
. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:03 - Above log line repeated 1 times more
. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:04 - Flushing DNS
. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading
I 2018.03.24 07:52:05 - Checking route IPv4
I 2018.03.24 07:52:05 - Checking DNS
. 2018.03.24 07:52:06 - Checking DNS failed:
. 2018.03.24 07:52:06 - Checking DNS (2° try)
. 2018.03.24 07:52:07 - Checking DNS failed:
. 2018.03.24 07:52:07 - Checking DNS (3° try)
. 2018.03.24 07:52:10 - Checking DNS failed:
E 2018.03.24 07:52:10 - Checking DNS failed.
. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:52:10 - Disconnecting
. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1
. 2018.03.24 07:52:10 - Sending management termination signal
. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:52:13 - Updating systems & servers data ...
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:52:15 - Connection terminated.
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:52:19 - Checking authorization ...
. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)
. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:52:22 - Above log line repeated 1 times more
. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:52:23 - Flushing DNS
I 2018.03.24 07:52:23 - Checking route IPv4
. 2018.03.24 07:52:34 - Systems & servers data update completed
. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.03.24 07:52:43 - Checking route (2° try)
. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds
. 2018.03.24 07:53:04 - Checking route (3° try)
. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds
E 2018.03.24 07:53:26 - Checking route IPv4 failed.
. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:53:26 - Disconnecting
. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1
. 2018.03.24 07:53:26 - Sending management termination signal
. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:53:31 - Connection terminated.
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:53:35 - Checking authorization ...
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca
. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443
. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'
. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:53:38 - Above log line repeated 1 times more
. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255
. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1
. 2018.03.24 07:53:39 - Flushing DNS
I 2018.03.24 07:53:39 - Checking route IPv4
. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:53:59 - Checking route (2° try)
. 2018.03.24 07:54:20 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:54:20 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:54:20 - Disconnecting
. 2018.03.24 07:54:20 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.4.0.1
. 2018.03.24 07:54:20 - Sending management termination signal
. 2018.03.24 07:54:20 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 184.75.221.210 192.168.50.1 255.255.255.255
. 2018.03.24 07:54:25 - OpenVPN > delete net 184.75.221.210: gateway 192.168.50.1
. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:25 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:25 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:25 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:54:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:54:25 - Connection terminated.
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2018.03.24 07:54:26 - Flushing DNS
I 2018.03.24 07:54:26 - Session terminated.
. 2018.03.24 07:54:30 - Updating systems & servers data ...
E 2018.03.24 07:54:31 - Object reference not set to an instance of an object
. 2018.03.24 07:54:31 - Systems & servers data update completed
I 2018.03.24 07:54:39 - Session starting.
I 2018.03.24 07:54:39 - Checking authorization ...
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:54:41 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2018.03.24 07:54:41 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:54:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:54:41 - Connection to OpenVPN Management Interface
. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:54:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:54:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:54:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.202:443
. 2018.03.24 07:54:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:54:41 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:54:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.202:443
. 2018.03.24 07:54:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=130e2fa4 7830b1a5
. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:54:41 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:54:41 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:54:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:54:41 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2018.03.24 07:54:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:54:41 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443
. 2018.03.24 07:54:42 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:54:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.163 255.255.0.0,peer-id 5,cipher AES-256-GCM'
. 2018.03.24 07:54:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.24 07:54:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.24 07:54:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:54:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.24 07:54:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:54:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:54:42 - Above log line repeated 1 times more
. 2018.03.24 07:54:42 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:54:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:54:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:54:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.163 10.4.1.163 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.163 255.255.0.0
. 2018.03.24 07:54:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.163
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 184.75.221.202 192.168.50.1 255.255.255.255
. 2018.03.24 07:54:42 - OpenVPN > add net 184.75.221.202: gateway 192.168.50.1
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:54:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:54:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:54:43 - Routes, added a new route, 184.75.221.203 for gateway 10.4.0.1
. 2018.03.24 07:54:43 - Flushing DNS
I 2018.03.24 07:54:43 - Checking route IPv4
. 2018.03.24 07:55:03 - curl: (28) Connection timed out after 20003 milliseconds
. 2018.03.24 07:55:03 - Checking route (2° try)
. 2018.03.24 07:55:25 - curl: (28) Connection timed out after 20002 milliseconds
. 2018.03.24 07:55:25 - Checking route (3° try)
. 2018.03.24 07:55:47 - curl: (28) Connection timed out after 20000 milliseconds
E 2018.03.24 07:55:47 - Checking route IPv4 failed.
. 2018.03.24 07:55:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.24 07:55:47 - Disconnecting
. 2018.03.24 07:55:47 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.4.0.1
. 2018.03.24 07:55:47 - Sending management termination signal
. 2018.03.24 07:55:47 - Management - Send 'signal SIGTERM'
. 2018.03.24 07:55:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.24 07:55:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 184.75.221.202 192.168.50.1 255.255.255.255
. 2018.03.24 07:55:52 - OpenVPN > delete net 184.75.221.202: gateway 192.168.50.1
. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:52 - OpenVPN > Closing TUN/TAP interface
. 2018.03.24 07:55:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.24 07:55:52 - Connection terminated.
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Ethernet)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (FireWire)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Wi-Fi)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (iPhone USB)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Bluetooth PAN)
. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Thunderbolt Bridge)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2018.03.24 07:55:56 - Checking authorization ...
. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (Ethernet)
. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (FireWire)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Wi-Fi)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (iPhone USB)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)
! 2018.03.24 07:55:57 - Connecting to Alhena (Canada, Toronto, Ontario)
. 2018.03.24 07:55:57 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.03.24 07:55:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.24 07:55:57 - Connection to OpenVPN Management Interface
. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
. 2018.03.24 07:55:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443
. 2018.03.24 07:55:57 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
. 2018.03.24 07:55:57 - OpenVPN > UDP link local: (not bound)
. 2018.03.24 07:55:57 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443
. 2018.03.24 07:55:57 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=90b230f1 b154ba27
. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.24 07:55:57 - OpenVPN > VERIFY KU OK
. 2018.03.24 07:55:57 - OpenVPN > Validating certificate extended key usage
. 2018.03.24 07:55:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.24 07:55:57 - OpenVPN > VERIFY EKU OK
. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.24 07:55:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.24 07:55:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443
. 2018.03.24 07:55:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.24 07:55:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.147 255.255.0.0'
. 2018.03.24 07:55:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.24 07:55:59 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
. 2018.03.24 07:55:59 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2018.03.24 07:55:59 - Above log line repeated 1 times more
. 2018.03.24 07:55:59 - OpenVPN > Opened utun device utun2
. 2018.03.24 07:55:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 delete
. 2018.03.24 07:55:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.03.24 07:55:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 10.4.21.147 10.4.21.147 netmask 255.255.0.0 mtu 1500 up
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.147 255.255.0.0
. 2018.03.24 07:55:59 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.147
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 162.219.176.2 192.168.50.1 255.255.255.255
. 2018.03.24 07:55:59 - OpenVPN > add net 162.219.176.2: gateway 192.168.50.1
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:59 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.03.24 07:55:59 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.03.24 07:55:59 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.03.24 07:55:59 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2018.03.24 07:56:00 - Routes, added a new route, 162.219.176.3 for gateway 10.4.0.1
. 2018.03.24 07:56:00 - Flushing DNS
I 2018.03.24 07:56:00 - Checking route IPv4
. 2018.03.24 07:56:20 - curl: (28) Connection timed out after 20000 milliseconds
. 2018.03.24 07:56:20 - Checking route (2° try)

 

The solution in the moment is to hit "Cancel" and then completely shut down and restart Eddie.  He's much happier to connect to a reocmmended server after that.

 

Just wanted to pass this along in case it's relevant to the beta or in case there's something obvious that I can to change my setup a bit and smooth out the reconnecting process.

 

Thanks!

Share this post


Link to post

Greetings,

 

I'm running the Eddie beta (2.14.2) with Network Lock activated on a MacOS laptop (10.13.3), which I do have to close / put to sleep regularly.  Eddie sometimes has an issue reconnecting when I wake the laptop from it's slumbers.  It doesn't happen every time I wake the machine, but it does happen fairly often.

 

Here are some log entries that I grabbed recently when Eddie was unable to complete his IPv4 checks and finish connecting after I woke the laptop. Eddie seems to try about 3 times to reconnect and then disconnects and tries again, often still unsuccessfully.

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

 

I've tried hitting "Cancel" on the main Eddie window, refreshing the servers list on the Servers tab, and then reconnecting to a recommended server.  This usually doesn't work either and results in the same issue with checking the IPv4 route.  Here's a batch of log entries from one of those attempts (cancel, refresh servers list, reconnect to recommended server).

 

. 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml

. 2018.03.22 07:38:30 - Command line arguments (0):

. 2018.03.22 07:38:32 - OpenVPN Driver - Expected

. 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

W 2018.03.22 07:38:33 - Recovery. Unexpected crash?

. 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1

! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

. 2018.03.22 07:38:33 - Updating systems & servers data ...

. 2018.03.22 07:38:33 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:33 - Session starting.

. 2018.03.22 07:38:34 - Systems & servers data update completed

I 2018.03.22 07:38:39 - Checking authorization ...

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK

. 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK

. 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 07:38:42 - Above log line repeated 1 times more

. 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2

. 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 07:38:43 - Flushing DNS

. 2018.03.22 07:38:43 - macOS - PF rules updated, reloading

I 2018.03.22 07:38:43 - Checking route IPv4

I 2018.03.22 07:38:44 - Checking DNS

! 2018.03.22 07:38:44 - Connected.

. 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 07:48:40 - Updating systems & servers data ...

. 2018.03.22 07:48:42 - Systems & servers data update completed

. 2018.03.22 08:01:23 - Updating systems & servers data ...

. 2018.03.22 08:01:27 - Systems & servers data update completed

. 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 10:01:36 - macOS - PF rules updated, reloading

! 2018.03.22 10:01:37 - Disconnecting

. 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1

. 2018.03.22 10:01:37 - Sending management termination signal

. 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 10:01:37 - Connection terminated.

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.22 10:01:45 - Checking authorization ...

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)

. 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5

. 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK

. 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK

. 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443

. 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'

. 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 10:01:48 - Above log line repeated 1 times more

. 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2

. 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 10:01:49 - Flushing DNS

. 2018.03.22 10:01:50 - macOS - PF rules updated, reloading

I 2018.03.22 10:01:50 - Checking route IPv4

I 2018.03.22 10:01:50 - Checking DNS

! 2018.03.22 10:01:50 - Connected.

. 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed

. 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.22 12:01:40 - macOS - PF rules updated, reloading

! 2018.03.22 12:01:40 - Disconnecting

. 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1

. 2018.03.22 12:01:40 - Sending management termination signal

. 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface

. 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.22 12:01:40 - Connection terminated.

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.22 12:01:41 - Updating systems & servers data ...

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.22 12:01:41 - Systems & servers data update completed

I 2018.03.22 12:01:46 - Checking authorization ...

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)

. 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e

. 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK

. 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK

. 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443

. 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'

. 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.22 12:01:51 - Above log line repeated 1 times more

. 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2

. 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.22 12:01:52 - Flushing DNS

. 2018.03.22 12:01:52 - macOS - PF rules updated, reloading

I 2018.03.22 12:01:53 - Checking route IPv4

I 2018.03.22 12:01:53 - Checking DNS

! 2018.03.22 12:01:53 - Connected.

. 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed

. 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)

. 2018.03.24 07:51:56 - macOS - PF rules updated, reloading

! 2018.03.24 07:51:56 - Disconnecting

. 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1

. 2018.03.24 07:51:56 - Sending management termination signal

. 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255

. 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.03.24 07:51:56 - Connection terminated.

. 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:00 - Checking authorization ...

W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)

. 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443

. 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:03 - Above log line repeated 1 times more

. 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:04 - Flushing DNS

. 2018.03.24 07:52:05 - macOS - PF rules updated, reloading

I 2018.03.24 07:52:05 - Checking route IPv4

I 2018.03.24 07:52:05 - Checking DNS

. 2018.03.24 07:52:06 - Checking DNS failed:

. 2018.03.24 07:52:06 - Checking DNS (2° try)

. 2018.03.24 07:52:07 - Checking DNS failed:

. 2018.03.24 07:52:07 - Checking DNS (3° try)

. 2018.03.24 07:52:10 - Checking DNS failed:

E 2018.03.24 07:52:10 - Checking DNS failed.

. 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:52:10 - Disconnecting

. 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1

. 2018.03.24 07:52:10 - Sending management termination signal

. 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:52:13 - Updating systems & servers data ...

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:52:15 - Connection terminated.

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:52:19 - Checking authorization ...

. 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)

. 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:52:22 - Above log line repeated 1 times more

. 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:52:23 - Flushing DNS

I 2018.03.24 07:52:23 - Checking route IPv4

. 2018.03.24 07:52:34 - Systems & servers data update completed

. 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds

. 2018.03.24 07:52:43 - Checking route (2° try)

. 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds

. 2018.03.24 07:53:04 - Checking route (3° try)

. 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds

E 2018.03.24 07:53:26 - Checking route IPv4 failed.

. 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:53:26 - Disconnecting

. 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1

. 2018.03.24 07:53:26 - Sending management termination signal

. 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:53:31 - Connection terminated.

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:53:35 - Checking authorization ...

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)

. 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca

. 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443

. 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'

. 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:53:38 - Above log line repeated 1 times more

. 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:53:39 - Flushing DNS

I 2018.03.24 07:53:39 - Checking route IPv4

. 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:53:59 - Checking route (2° try)

. 2018.03.24 07:54:20 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:54:20 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:54:20 - Disconnecting

. 2018.03.24 07:54:20 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.4.0.1

. 2018.03.24 07:54:20 - Sending management termination signal

. 2018.03.24 07:54:20 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 184.75.221.210 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:25 - OpenVPN > delete net 184.75.221.210: gateway 192.168.50.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:25 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:25 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:54:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:54:25 - Connection terminated.

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:25 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

. 2018.03.24 07:54:26 - Flushing DNS

I 2018.03.24 07:54:26 - Session terminated.

. 2018.03.24 07:54:30 - Updating systems & servers data ...

E 2018.03.24 07:54:31 - Object reference not set to an instance of an object

. 2018.03.24 07:54:31 - Systems & servers data update completed

I 2018.03.24 07:54:39 - Session starting.

I 2018.03.24 07:54:39 - Checking authorization ...

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:54:40 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:54:41 - Connecting to Alkurhah (Canada, Toronto, Ontario)

. 2018.03.24 07:54:41 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:54:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:54:41 - Connection to OpenVPN Management Interface

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:54:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:54:41 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:54:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=130e2fa4 7830b1a5

. 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:54:41 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:54:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:54:41 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org

. 2018.03.24 07:54:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:54:41 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443

. 2018.03.24 07:54:42 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:54:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.163 255.255.0.0,peer-id 5,cipher AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.24 07:54:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.24 07:54:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.24 07:54:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:54:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:54:42 - Above log line repeated 1 times more

. 2018.03.24 07:54:42 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:54:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:54:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:54:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.163 10.4.1.163 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.163 255.255.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.163

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:54:42 - OpenVPN > add net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:54:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:54:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:54:43 - Routes, added a new route, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:54:43 - Flushing DNS

I 2018.03.24 07:54:43 - Checking route IPv4

. 2018.03.24 07:55:03 - curl: (28) Connection timed out after 20003 milliseconds

. 2018.03.24 07:55:03 - Checking route (2° try)

. 2018.03.24 07:55:25 - curl: (28) Connection timed out after 20002 milliseconds

. 2018.03.24 07:55:25 - Checking route (3° try)

. 2018.03.24 07:55:47 - curl: (28) Connection timed out after 20000 milliseconds

E 2018.03.24 07:55:47 - Checking route IPv4 failed.

. 2018.03.24 07:55:47 - OpenVPN > Initialization Sequence Completed

! 2018.03.24 07:55:47 - Disconnecting

. 2018.03.24 07:55:47 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.4.0.1

. 2018.03.24 07:55:47 - Sending management termination signal

. 2018.03.24 07:55:47 - Management - Send 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.03.24 07:55:47 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 184.75.221.202 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:52 - OpenVPN > delete net 184.75.221.202: gateway 192.168.50.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:52 - OpenVPN > Closing TUN/TAP interface

. 2018.03.24 07:55:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.03.24 07:55:52 - Connection terminated.

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Ethernet)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (FireWire)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Wi-Fi)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (iPhone USB)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:52 - IPv6 restored on network adapter (Thunderbolt Bridge)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (FireWire, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)

. 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)

. 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)

I 2018.03.24 07:55:56 - Checking authorization ...

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (Ethernet)

. 2018.03.24 07:55:56 - IPv6 disabled on network adapter (FireWire)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Wi-Fi)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (iPhone USB)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)

! 2018.03.24 07:55:57 - Connecting to Alhena (Canada, Toronto, Ontario)

. 2018.03.24 07:55:57 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.03.24 07:55:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.24 07:55:57 - Connection to OpenVPN Management Interface

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]

. 2018.03.24 07:55:57 - OpenVPN > UDP link local: (not bound)

. 2018.03.24 07:55:57 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:57 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=90b230f1 b154ba27

. 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.24 07:55:57 - OpenVPN > VERIFY KU OK

. 2018.03.24 07:55:57 - OpenVPN > Validating certificate extended key usage

. 2018.03.24 07:55:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.24 07:55:57 - OpenVPN > VERIFY EKU OK

. 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.24 07:55:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.24 07:55:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443

. 2018.03.24 07:55:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.24 07:55:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.147 255.255.0.0'

. 2018.03.24 07:55:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.24 07:55:59 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8

. 2018.03.24 07:55:59 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2018.03.24 07:55:59 - Above log line repeated 1 times more

. 2018.03.24 07:55:59 - OpenVPN > Opened utun device utun2

. 2018.03.24 07:55:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 delete

. 2018.03.24 07:55:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.03.24 07:55:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 10.4.21.147 10.4.21.147 netmask 255.255.0.0 mtu 1500 up

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.147 255.255.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.147

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 162.219.176.2 192.168.50.1 255.255.255.255

. 2018.03.24 07:55:59 - OpenVPN > add net 162.219.176.2: gateway 192.168.50.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.03.24 07:55:59 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.03.24 07:55:59 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.03.24 07:55:59 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2018.03.24 07:56:00 - Routes, added a new route, 162.219.176.3 for gateway 10.4.0.1

. 2018.03.24 07:56:00 - Flushing DNS

I 2018.03.24 07:56:00 - Checking route IPv4

. 2018.03.24 07:56:20 - curl: (28) Connection timed out after 20000 milliseconds

. 2018.03.24 07:56:20 - Checking route (2° try)

 

The solution in the moment is to hit "Cancel" and then completely shut down and restart Eddie.  He's much happier to connect to a reocmmended server after that.

 

Just wanted to pass this along in case it's relevant to the beta or in case there's something obvious that I can to change my setup a bit and smooth out the reconnecting process.

 

Thanks!

Great post. Please try going to Eddies preferences and unchecking "Check Air DNS" and "Check if Air Tunnel works" and then connect to a different location .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Hey LZ1,

 

Thanks much for the prompt advice!  I made those changes not long after you posted them and reconnected.  I've been letting Eddie (and the laptop) run as usual since, to see how things go.  So far, Eddie has reconnected much smoother after waking the laptop from sleep.  Those changes seem to have helped.  It is kosher to leave those settings in place then?  Or is this temporary fix with something else needed later on?

 

Thanks much for the help!

Share this post


Link to post

Hey LZ1,

 

Thanks much for the prompt advice!  I made those changes not long after you posted them and reconnected.  I've been letting Eddie (and the laptop) run as usual since, to see how things go.  So far, Eddie has reconnected much smoother after waking the laptop from sleep.  Those changes seem to have helped.  It is kosher to leave those settings in place then?  Or is this temporary fix with something else needed later on?

 

Thanks much for the help!

No worries, glad to be of assistance .

 

It's more ideal they're enabled and you can always try enable them afterwards, but when this issue occurs, it's a "quick fix". You can check here.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

 

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

 

Have you tried the portable mono version? This one works flawlessly for me in Arch Linux and it's wicked fast, much faster than the ppa version that I used in Ubuntu 16.04. The non-mono portable version on the other hand is slow as hell. I haven't tested the AUR version yet.

 

No such luck I can't get the portable mono version to run on my system at all, unhandled exception everytime.

Share this post


Link to post

 

 

Recently tried 2.14.2 when the aur package I use was updated, I was unable to log into the client with my install. I also tried a portable version of the client since I was having trouble, the portable client was very slow connecting to servers and many of the options didn't seem to work/respond.

 

I have since reverted to the stable branch, however I can no longer use network lock with this version of Eddie. Any updates coming soon that may help me with my issues? I would like to go back to using experimental branches so I can use the network lock feature again. If needed I can reinstall the 2.14.2 aur package/portable client and try and post some logs if needed to help.

 

Have you tried the portable mono version? This one works flawlessly for me in Arch Linux and it's wicked fast, much faster than the ppa version that I used in Ubuntu 16.04. The non-mono portable version on the other hand is slow as hell. I haven't tested the AUR version yet.

 

No such luck I can't get the portable mono version to run on my system at all, unhandled exception everytime.

Perhaps you could share some details about that exception?


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Perhaps you could share some details about that exception?

 

Assuming I'm not doing the wrong thing running Eddie-UI.exe under mono, I get this message everytime with the latest portable-mono from the site.

 

Unhandled Exception:

System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

[ERROR] FATAL UNHANDLED EXCEPTION: System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

Share this post


Link to post

 

Perhaps you could share some details about that exception?

 

Assuming I'm not doing the wrong thing running Eddie-UI.exe under mono, I get this message everytime with the latest portable-mono from the site.

 

Unhandled Exception:

System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

[ERROR] FATAL UNHANDLED EXCEPTION: System.TypeInitializationException: The type initializer for 'System.Console' threw an exception. ---> System.TypeInitializationException: The type initializer for 'System.ConsoleDriver' threw an exception. ---> System.Exception: Magic number is wrong: 542

  at System.TermInfoReader.ReadHeader (System.Byte[] buffer, System.Int32& position) [0x00028] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoReader..ctor (System.String term, System.String filename) [0x0005f] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.TermInfoDriver..ctor (System.String term) [0x00055] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver.CreateTermInfoDriver (System.String term) [0x00000] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.ConsoleDriver..cctor () [0x0004d] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at System.Console.SetupStreams (System.Text.Encoding inputEncoding, System.Text.Encoding outputEncoding) [0x00007] in <2dfe84a36ef4410ca18642993b51b799>:0

  at System.Console..cctor () [0x0008e] in <2dfe84a36ef4410ca18642993b51b799>:0

   --- End of inner exception stack trace ---

  at Eddie.Forms.Linux.Program.Main () [0x000d1] in <7dfcf011e3ff4e82838474e627718575>:0

 

Ah that. Please look here, as it seems to be the same. It's not particularly helpful, but at least you're not the only one.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Ah that. Please look here, as it seems to be the same. It's not particularly helpful, but at least you're not the only one.

 

Yeah I was just reading through a few of these threads in the other forum and can now get them opening thanks to this fix but no chance of logging in, just hangs at 'logout...' for now

 

The very short log

 

 

. 2018.03.29 20:29:19 - Eddie version: 2.14.2 / linux_x64, System: Linux, Name: Arch Linux \r (\l), Version: Linux cinnabar 4.15.13-1-ARCH #1 SMP PREEMPT Sun Mar 25 11:27:57 UTC 2018 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319

. 2018.03.29 20:29:19 - Reading options from /opt/eddie/AirVPN.xml

. 2018.03.29 20:29:19 - Command line arguments (1): console.mode="none"

. 2018.03.29 20:29:20 - OpenVPN Driver - Found, /dev/net/tun

. 2018.03.29 20:29:20 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2n  7 Dec 2017, LZO 2.10 (/opt/eddie/openvpn)

. 2018.03.29 20:29:20 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0g  2 Nov 2017 (/usr/bin/ssh)

. 2018.03.29 20:29:20 - SSL - Version: stunnel 5.40 (/opt/eddie/stunnel)

. 2018.03.29 20:29:20 - curl - Version: 7.59.0 (/usr/bin/curl)

. 2018.03.29 20:29:20 - Certification Authorities: /opt/eddie/res//cacert.pem

 

Guess I'll be sticking with 2.13.6 for a bit longer

Share this post


Link to post

I have eddie on autostart and through all versions appears the same "problem":

 

It connects EVERY TIME automatically to mirach (i have only NL whitelisted), if i blacklist mirach it connects always to the next one in list "Merga"... thats really annoying... i just want it to connect always to the one with lowest latency or in my case to the one with lowest bandwith usage, cause i have set it to "speed" below.

 

Why is that?

Share this post


Link to post

I have eddie on autostart and through all versions appears the same "problem":

 

It connects EVERY TIME automatically to mirach (i have only NL whitelisted), if i blacklist mirach it connects always to the next one in list "Merga"... thats really annoying... i just want it to connect always to the one with lowest latency or in my case to the one with lowest bandwith usage, cause i have set it to "speed" below.

 

Why is that?

Staff did mention making the auto-selection more intelligent in the future, but I can't find the post for you at this moment sorry.  Otherwise there's the usual FAQ on how Eddie selects. I don't think setting the scoring rule to speed makes any difference, as that's only for how things are ordered in the list.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...