Jump to content
Not connected, Your IP: 3.81.30.41

Recommended Posts

Every time I try to connect I get an error message saying driver installation failed and I never actually connect. In the logs I see two things that seem to be related. "cannot find tunnel adapter" and "driver installation failed'.

 

Any tips on what I should try to do to fix this?

 

 

 

I 2018.02.23 18:48:00 - Session starting.
. 2018.02.23 18:48:00 - Cannot find tunnel adapter.
! 2018.02.23 18:48:00 - Installing tunnel driver
. 2018.02.23 18:48:00 - Shell(7) of 'C:\Program Files\AirVPN\tap-windows.exe', 1 args: '/S';
. 2018.02.23 18:48:01 - Shell(7) done in 719 ms, exit: 0
. 2018.02.23 18:48:04 - Cannot find tunnel adapter.
F 2018.02.23 18:48:04 - Driver installation failed.

Share this post


Link to post

Hello!

 

First of all, assuming you're using Eddie, then please paste your entire log .

 

Otherwise there's other threads you can look through in the meantime.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I read through some other posts and tried installing the TAP driver from the OpenVPN client and then tried again.

 

I 2018.02.23 18:48:00 - Session starting.
. 2018.02.23 18:48:00 - Cannot find tunnel adapter.
! 2018.02.23 18:48:00 - Installing tunnel driver
. 2018.02.23 18:48:00 - Shell(7) of 'C:\Program Files\AirVPN\tap-windows.exe', 1 args: '/S';
. 2018.02.23 18:48:01 - Shell(7) done in 719 ms, exit: 0
. 2018.02.23 18:48:04 - Cannot find tunnel adapter.
F 2018.02.23 18:48:04 - Driver installation failed.
. 2018.02.23 18:54:08 - Updating systems & servers data ...
. 2018.02.23 18:54:09 - Systems & servers data update completed
. 2018.02.23 19:04:13 - Updating systems & servers data ...
. 2018.02.23 19:04:15 - Systems & servers data update completed
. 2018.02.23 19:14:21 - Updating systems & servers data ...
. 2018.02.23 19:14:22 - Systems & servers data update completed
. 2018.02.23 19:24:29 - Updating systems & servers data ...
. 2018.02.23 19:24:30 - Systems & servers data update completed
. 2018.02.23 19:34:36 - Updating systems & servers data ...
. 2018.02.23 19:34:37 - Systems & servers data update completed
I 2018.02.23 19:42:16 - Session starting.
. 2018.02.23 19:42:16 - Cannot find tunnel adapter.
! 2018.02.23 19:42:16 - Installing tunnel driver
. 2018.02.23 19:42:16 - Shell(8) of 'C:\Program Files\AirVPN\tap-windows.exe', 1 args: '/S';
. 2018.02.23 19:42:17 - Shell(8) done in 953 ms, exit: 0
. 2018.02.23 19:42:20 - Cannot find tunnel adapter.
F 2018.02.23 19:42:20 - Driver installation failed.
 


Edit:
I generated a config for OpenVPN and ran that and it connected fine. So that still points to something with the eddie client itself.

Share this post


Link to post

Good.

 

But that was why I requested your entire log, instead of just the area you cut out. As then we would be able to see which Eddie client you're using and whether or not it's appropriate to recommend that you update it.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Here is a fresh install and attempt to connect.

 

I 2018.02.23 20:09:45 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.02.23 20:09:47 - Command line arguments (1): path="home"
. 2018.02.23 20:09:48 - Cannot find tunnel adapter.
. 2018.02.23 20:09:48 - Shell(1) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version';
. 2018.02.23 20:09:49 - Shell(1) done in 781 ms, exit: 1, out: 'OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 20:09:49 -     library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 20:09:49 -     Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 20:09:49 -     Originally developed by James Yonan
. 2018.02.23 20:09:49 -     Copyright © 2002-2017 OpenVPN Technologies, Inc. <sales@openvpn.net>
. 2018.02.23 20:09:49 -     Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multi=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=no enable_plugin_down_root=no enable_plugins=yes enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=yes enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=no enable_werror=no enable_win32_dll=yes enable_x509_alt_username=no with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_special_build= with_sysroot=no'
. 2018.02.23 20:09:49 - Shell(2) of 'C:\Program Files\AirVPN\plink.exe', 1 args: '-V';
. 2018.02.23 20:09:49 - Shell(2) done in 141 ms, exit: 1, out: 'plink: Release 0.67'
. 2018.02.23 20:09:49 - Shell(3) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version';
. 2018.02.23 20:09:50 - Shell(3) done in 531 ms, exit: 0, err: 'stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.02.23 20:09:50 -     Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.02.23 20:09:50 -     Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.02.23 20:09:50 -     Global options:
. 2018.02.23 20:09:50 -     RNDbytes               = 64
. 2018.02.23 20:09:50 -     RNDoverwrite           = yes
. 2018.02.23 20:09:50 -     taskbar                = yes
. 2018.02.23 20:09:50 -     Service-level options:
. 2018.02.23 20:09:50 -     ciphers                = HIGH:!DH:!aNULL:!SSLv2
. 2018.02.23 20:09:50 -     curve                  = prime256v1
. 2018.02.23 20:09:50 -     debug                  = notice
. 2018.02.23 20:09:50 -     logId                  = sequential
. 2018.02.23 20:09:50 -     options                = NO_SSLv2
. 2018.02.23 20:09:50 -     options                = NO_SSLv3
. 2018.02.23 20:09:50 -     sessionCacheSize       = 1000
. 2018.02.23 20:09:50 -     sessionCacheTimeout    = 300 seconds
. 2018.02.23 20:09:50 -     stack                  = 65536 bytes
. 2018.02.23 20:09:50 -     TIMEOUTbusy            = 300 seconds
. 2018.02.23 20:09:50 -     TIMEOUTclose           = 60 seconds
. 2018.02.23 20:09:50 -     TIMEOUTconnect         = 10 seconds
. 2018.02.23 20:09:50 -     TIMEOUTidle            = 43200 seconds
. 2018.02.23 20:09:50 -     verify                 = none'
. 2018.02.23 20:09:50 - Shell(4) of 'C:\Program Files\AirVPN\curl.exe', 1 args: '--version';
. 2018.02.23 20:09:50 - Shell(4) done in 391 ms, exit: 0, out: 'curl 7.54.1 (x86_64-pc-win32) libcurl/7.54.1 OpenSSL/1.1.0f zlib/1.2.11 WinIDN libssh2/1.8.0 nghttp2/1.23.1
. 2018.02.23 20:09:50 -     Release-Date: 2017-06-14
. 2018.02.23 20:09:50 -     Protocols: dict file ftp ftps gopher http https imap imaps ldap ldaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
. 2018.02.23 20:09:50 -     Features: AsynchDNS IDN IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL libz TLS-SRP HTTP2 HTTPS-proxy'
E 2018.02.23 20:09:50 - OpenVPN Driver - Not available - Will be installed at next connection.
I 2018.02.23 20:09:50 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.02.23 20:09:50 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.02.23 20:09:50 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.02.23 20:09:50 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.02.23 20:09:50 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
! 2018.02.23 20:09:53 - Activation of Network Lock - Windows Filtering Platform
. 2018.02.23 20:09:53 - Updating systems & servers data ...
I 2018.02.23 20:09:53 - Session starting.
. 2018.02.23 20:09:54 - Cannot find tunnel adapter.
! 2018.02.23 20:09:54 - Installing tunnel driver
. 2018.02.23 20:09:54 - Shell(5) of 'C:\Program Files\AirVPN\tap-windows.exe', 1 args: '/S';
. 2018.02.23 20:09:55 - Systems & servers data update completed
. 2018.02.23 20:09:56 - Shell(5) done in 2438 ms, exit: 0
. 2018.02.23 20:09:59 - Cannot find tunnel adapter.
F 2018.02.23 20:09:59 - Driver installation failed.
! 2018.02.23 20:10:04 - Deactivation of Network Lock

Share this post


Link to post

Thank you, that's more like it.

 

Can you try go to Control Panel > Network & Sharing center > Network Adapters > Disable and then re-enable TAP. Then re-connect to a location in Eddie? Sometimes this works.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Figured it out, TAP adapter was missing and every "solution" I had read before had me going somewhere else when attempting to re-enable it. Got it re-enabled and now can at least attempt to connect, but when attempting to connect it just keeps connecting and then disconnecting. For some reason, it seems to be creating multiple different connections when I goto my overview and it makes it so I have reached my limit per account.

Share this post


Link to post

Well that's progress. But I'm afraid that as before, your explanations are good, but logs are better . I assume it has resulted in authorisation errors. In which case you may go to your Client Area and make any necessary disconnections to stay under the limit. You may also try logging out of both the website and Eddie client and then in again.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I tried logging out and logging in and restarting the client just to see if that would work quickly. However, not much as changed.

 

I 2018.02.23 21:03:10 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.02.23 21:03:10 - Command line arguments (1): path="home"
. 2018.02.23 21:03:11 - Shell(1) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version';
. 2018.02.23 21:03:11 - Shell(1) done in 31 ms, exit: 1, out: 'OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:11 -     library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:11 -     Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:11 -     Originally developed by James Yonan
. 2018.02.23 21:03:11 -     Copyright © 2002-2017 OpenVPN Technologies, Inc. <sales@openvpn.net>
. 2018.02.23 21:03:11 -     Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multi=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=no enable_plugin_down_root=no enable_plugins=yes enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=yes enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=no enable_werror=no enable_win32_dll=yes enable_x509_alt_username=no with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_special_build= with_sysroot=no'
. 2018.02.23 21:03:11 - Shell(2) of 'C:\Program Files\AirVPN\plink.exe', 1 args: '-V';
. 2018.02.23 21:03:11 - Shell(2) done in 31 ms, exit: 1, out: 'plink: Release 0.67'
. 2018.02.23 21:03:11 - Shell(3) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version';
. 2018.02.23 21:03:11 - Shell(3) done in 32 ms, exit: 0, err: 'stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.02.23 21:03:11 -     Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.02.23 21:03:11 -     Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.02.23 21:03:11 -     Global options:
. 2018.02.23 21:03:11 -     RNDbytes               = 64
. 2018.02.23 21:03:11 -     RNDoverwrite           = yes
. 2018.02.23 21:03:11 -     taskbar                = yes
. 2018.02.23 21:03:11 -     Service-level options:
. 2018.02.23 21:03:11 -     ciphers                = HIGH:!DH:!aNULL:!SSLv2
. 2018.02.23 21:03:11 -     curve                  = prime256v1
. 2018.02.23 21:03:11 -     debug                  = notice
. 2018.02.23 21:03:11 -     logId                  = sequential
. 2018.02.23 21:03:11 -     options                = NO_SSLv2
. 2018.02.23 21:03:11 -     options                = NO_SSLv3
. 2018.02.23 21:03:11 -     sessionCacheSize       = 1000
. 2018.02.23 21:03:11 -     sessionCacheTimeout    = 300 seconds
. 2018.02.23 21:03:11 -     stack                  = 65536 bytes
. 2018.02.23 21:03:11 -     TIMEOUTbusy            = 300 seconds
. 2018.02.23 21:03:11 -     TIMEOUTclose           = 60 seconds
. 2018.02.23 21:03:11 -     TIMEOUTconnect         = 10 seconds
. 2018.02.23 21:03:11 -     TIMEOUTidle            = 43200 seconds
. 2018.02.23 21:03:11 -     verify                 = none'
. 2018.02.23 21:03:11 - Shell(4) of 'C:\Program Files\AirVPN\curl.exe', 1 args: '--version';
. 2018.02.23 21:03:11 - Shell(4) done in 31 ms, exit: 0, out: 'curl 7.54.1 (x86_64-pc-win32) libcurl/7.54.1 OpenSSL/1.1.0f zlib/1.2.11 WinIDN libssh2/1.8.0 nghttp2/1.23.1
. 2018.02.23 21:03:11 -     Release-Date: 2017-06-14
. 2018.02.23 21:03:11 -     Protocols: dict file ftp ftps gopher http https imap imaps ldap ldaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
. 2018.02.23 21:03:11 -     Features: AsynchDNS IDN IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL libz TLS-SRP HTTP2 HTTPS-proxy'
I 2018.02.23 21:03:11 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.02.23 21:03:11 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.02.23 21:03:11 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.02.23 21:03:11 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.02.23 21:03:11 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.02.23 21:03:11 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
. 2018.02.23 21:03:11 - Updating systems & servers data ...
I 2018.02.23 21:03:11 - Session starting.
. 2018.02.23 21:03:12 - IPv6 disabled with packet filtering.
. 2018.02.23 21:03:12 - Systems & servers data update completed
I 2018.02.23 21:03:19 - Checking authorization ...
! 2018.02.23 21:03:20 - Connecting to Spica (Canada, Toronto, Ontario)
. 2018.02.23 21:03:20 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:20 - Connection to OpenVPN Management Interface
. 2018.02.23 21:03:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.19:443
. 2018.02.23 21:03:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:03:20 - OpenVPN > UDP link local: (not bound)
. 2018.02.23 21:03:20 - OpenVPN > UDP link remote: [AF_INET]199.19.94.19:443
. 2018.02.23 21:03:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:20 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.19:443, sid=b526b56b 48085ebd
. 2018.02.23 21:03:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:03:20 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:03:20 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:03:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:03:20 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:03:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Spica, emailAddress=info@airvpn.org
. 2018.02.23 21:03:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:03:20 - OpenVPN > [spica] Peer Connection Initiated with [AF_INET]199.19.94.19:443
. 2018.02.23 21:03:21 - OpenVPN > SENT CONTROL [spica]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:03:22 - Disconnecting
. 2018.02.23 21:03:22 - Connection terminated.
I 2018.02.23 21:03:25 - Checking authorization ...
! 2018.02.23 21:03:25 - Connecting to Dheneb (Canada, Toronto, Ontario)
. 2018.02.23 21:03:25 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:25 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:25 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:25 - Connection to OpenVPN Management Interface
. 2018.02.23 21:03:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.21.149.44:443
. 2018.02.23 21:03:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:03:25 - OpenVPN > UDP link local: (not bound)
. 2018.02.23 21:03:25 - OpenVPN > UDP link remote: [AF_INET]199.21.149.44:443
. 2018.02.23 21:03:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:25 - OpenVPN > TLS: Initial packet from [AF_INET]199.21.149.44:443, sid=c850aff6 2cd5684e
. 2018.02.23 21:03:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:03:25 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:03:25 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:03:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:03:25 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:03:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:03:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:03:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.21.149.44:443
! 2018.02.23 21:03:27 - Disconnecting
. 2018.02.23 21:03:27 - Connection terminated.
I 2018.02.23 21:03:30 - Checking authorization ...
! 2018.02.23 21:03:30 - Connecting to Tegmen (Canada, Toronto, Ontario)
. 2018.02.23 21:03:30 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:30 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:30 - Connection to OpenVPN Management Interface
. 2018.02.23 21:03:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:443
. 2018.02.23 21:03:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:03:30 - OpenVPN > UDP link local: (not bound)
. 2018.02.23 21:03:30 - OpenVPN > UDP link remote: [AF_INET]137.63.71.50:443
. 2018.02.23 21:03:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:31 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=1b801c8a 7c77b5bf
. 2018.02.23 21:03:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:03:31 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:03:31 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:03:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:03:31 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:03:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org
. 2018.02.23 21:03:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:03:31 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.50:443
. 2018.02.23 21:03:32 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:03:32 - Disconnecting
. 2018.02.23 21:03:32 - Connection terminated.
I 2018.02.23 21:03:34 - Cancel requested.
. 2018.02.23 21:03:34 - IPv6 restored with packet filtering.
! 2018.02.23 21:03:34 - Session terminated.

Share this post


Link to post

Try go to Preferences>Protocols>Switch to TCP and reconnect to a location of your choosing please.

 

You may in the end also choose to try out the experimental client, if things still don't work .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Still disconnecting, but this time it's not creating multiple connections under my overview.

 

I 2018.02.23 21:03:10 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.02.23 21:03:10 - Reading options from C:\Users\Michael\AppData\Local\AirVPN\AirVPN.xml
. 2018.02.23 21:03:10 - Command line arguments (1): path="home"
. 2018.02.23 21:03:11 - Shell(1) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version';
. 2018.02.23 21:03:11 - Shell(1) done in 31 ms, exit: 1, out: 'OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:11 -     library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:11 -     Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:11 -     Originally developed by James Yonan
. 2018.02.23 21:03:11 -     Copyright © 2002-2017 OpenVPN Technologies, Inc. <sales@openvpn.net>
. 2018.02.23 21:03:11 -     Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multi=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=no enable_plugin_down_root=no enable_plugins=yes enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=yes enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=no enable_werror=no enable_win32_dll=yes enable_x509_alt_username=no with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_special_build= with_sysroot=no'
. 2018.02.23 21:03:11 - Shell(2) of 'C:\Program Files\AirVPN\plink.exe', 1 args: '-V';
. 2018.02.23 21:03:11 - Shell(2) done in 31 ms, exit: 1, out: 'plink: Release 0.67'
. 2018.02.23 21:03:11 - Shell(3) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version';
. 2018.02.23 21:03:11 - Shell(3) done in 32 ms, exit: 0, err: 'stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.02.23 21:03:11 -     Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.02.23 21:03:11 -     Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.02.23 21:03:11 -     Global options:
. 2018.02.23 21:03:11 -     RNDbytes               = 64
. 2018.02.23 21:03:11 -     RNDoverwrite           = yes
. 2018.02.23 21:03:11 -     taskbar                = yes
. 2018.02.23 21:03:11 -     Service-level options:
. 2018.02.23 21:03:11 -     ciphers                = HIGH:!DH:!aNULL:!SSLv2
. 2018.02.23 21:03:11 -     curve                  = prime256v1
. 2018.02.23 21:03:11 -     debug                  = notice
. 2018.02.23 21:03:11 -     logId                  = sequential
. 2018.02.23 21:03:11 -     options                = NO_SSLv2
. 2018.02.23 21:03:11 -     options                = NO_SSLv3
. 2018.02.23 21:03:11 -     sessionCacheSize       = 1000
. 2018.02.23 21:03:11 -     sessionCacheTimeout    = 300 seconds
. 2018.02.23 21:03:11 -     stack                  = 65536 bytes
. 2018.02.23 21:03:11 -     TIMEOUTbusy            = 300 seconds
. 2018.02.23 21:03:11 -     TIMEOUTclose           = 60 seconds
. 2018.02.23 21:03:11 -     TIMEOUTconnect         = 10 seconds
. 2018.02.23 21:03:11 -     TIMEOUTidle            = 43200 seconds
. 2018.02.23 21:03:11 -     verify                 = none'
. 2018.02.23 21:03:11 - Shell(4) of 'C:\Program Files\AirVPN\curl.exe', 1 args: '--version';
. 2018.02.23 21:03:11 - Shell(4) done in 31 ms, exit: 0, out: 'curl 7.54.1 (x86_64-pc-win32) libcurl/7.54.1 OpenSSL/1.1.0f zlib/1.2.11 WinIDN libssh2/1.8.0 nghttp2/1.23.1
. 2018.02.23 21:03:11 -     Release-Date: 2017-06-14
. 2018.02.23 21:03:11 -     Protocols: dict file ftp ftps gopher http https imap imaps ldap ldaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
. 2018.02.23 21:03:11 -     Features: AsynchDNS IDN IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL libz TLS-SRP HTTP2 HTTPS-proxy'
I 2018.02.23 21:03:11 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.02.23 21:03:11 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.02.23 21:03:11 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.02.23 21:03:11 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.02.23 21:03:11 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.02.23 21:03:11 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
. 2018.02.23 21:03:11 - Updating systems & servers data ...
I 2018.02.23 21:03:11 - Session starting.
. 2018.02.23 21:03:12 - IPv6 disabled with packet filtering.
. 2018.02.23 21:03:12 - Systems & servers data update completed
I 2018.02.23 21:03:19 - Checking authorization ...
! 2018.02.23 21:03:20 - Connecting to Spica (Canada, Toronto, Ontario)
. 2018.02.23 21:03:20 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:20 - Connection to OpenVPN Management Interface
. 2018.02.23 21:03:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.19:443
. 2018.02.23 21:03:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:03:20 - OpenVPN > UDP link local: (not bound)
. 2018.02.23 21:03:20 - OpenVPN > UDP link remote: [AF_INET]199.19.94.19:443
. 2018.02.23 21:03:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:20 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.19:443, sid=b526b56b 48085ebd
. 2018.02.23 21:03:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:03:20 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:03:20 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:03:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:03:20 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:03:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Spica, emailAddress=info@airvpn.org
. 2018.02.23 21:03:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:03:20 - OpenVPN > [spica] Peer Connection Initiated with [AF_INET]199.19.94.19:443
. 2018.02.23 21:03:21 - OpenVPN > SENT CONTROL [spica]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:03:22 - Disconnecting
. 2018.02.23 21:03:22 - Connection terminated.
I 2018.02.23 21:03:25 - Checking authorization ...
! 2018.02.23 21:03:25 - Connecting to Dheneb (Canada, Toronto, Ontario)
. 2018.02.23 21:03:25 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:25 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:25 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:25 - Connection to OpenVPN Management Interface
. 2018.02.23 21:03:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.21.149.44:443
. 2018.02.23 21:03:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:03:25 - OpenVPN > UDP link local: (not bound)
. 2018.02.23 21:03:25 - OpenVPN > UDP link remote: [AF_INET]199.21.149.44:443
. 2018.02.23 21:03:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:25 - OpenVPN > TLS: Initial packet from [AF_INET]199.21.149.44:443, sid=c850aff6 2cd5684e
. 2018.02.23 21:03:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:03:25 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:03:25 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:03:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:03:25 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:03:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:03:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:03:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.21.149.44:443
! 2018.02.23 21:03:27 - Disconnecting
. 2018.02.23 21:03:27 - Connection terminated.
I 2018.02.23 21:03:30 - Checking authorization ...
! 2018.02.23 21:03:30 - Connecting to Tegmen (Canada, Toronto, Ontario)
. 2018.02.23 21:03:30 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:03:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:03:30 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:03:30 - Connection to OpenVPN Management Interface
. 2018.02.23 21:03:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:03:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:443
. 2018.02.23 21:03:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:03:30 - OpenVPN > UDP link local: (not bound)
. 2018.02.23 21:03:30 - OpenVPN > UDP link remote: [AF_INET]137.63.71.50:443
. 2018.02.23 21:03:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:03:31 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=1b801c8a 7c77b5bf
. 2018.02.23 21:03:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:03:31 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:03:31 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:03:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:03:31 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:03:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org
. 2018.02.23 21:03:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:03:31 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.50:443
. 2018.02.23 21:03:32 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:03:32 - Disconnecting
. 2018.02.23 21:03:32 - Connection terminated.
I 2018.02.23 21:03:34 - Cancel requested.
. 2018.02.23 21:03:34 - IPv6 restored with packet filtering.
! 2018.02.23 21:03:34 - Session terminated.
I 2018.02.23 21:10:16 - Session starting.
. 2018.02.23 21:10:17 - IPv6 disabled with packet filtering.
I 2018.02.23 21:10:17 - Checking authorization ...
! 2018.02.23 21:10:17 - Connecting to Avior (Canada, Toronto, Ontario)
. 2018.02.23 21:10:18 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:10:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:10:18 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:10:18 - Connection to OpenVPN Management Interface
. 2018.02.23 21:10:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
. 2018.02.23 21:10:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:10:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.234:443 [nonblock]
. 2018.02.23 21:10:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:19 - OpenVPN > TCP connection established with [AF_INET]184.75.223.234:443
. 2018.02.23 21:10:19 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.02.23 21:10:19 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.234:443
. 2018.02.23 21:10:19 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=7298f19f b76be8c0
. 2018.02.23 21:10:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:10:19 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:10:19 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:10:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:10:19 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:10:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:10:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:10:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.234:443
. 2018.02.23 21:10:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.23 21:10:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.135 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.02.23 21:10:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.02.23 21:10:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.02.23 21:10:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.02.23 21:10:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.02.23 21:10:21 - OpenVPN > interactive service msg_channel=0
! 2018.02.23 21:10:21 - Disconnecting
. 2018.02.23 21:10:21 - Connection terminated.
I 2018.02.23 21:10:24 - Checking authorization ...
! 2018.02.23 21:10:24 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2018.02.23 21:10:24 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:10:24 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:10:24 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:10:24 - Connection to OpenVPN Management Interface
. 2018.02.23 21:10:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.95.187:443
. 2018.02.23 21:10:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:10:24 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.19.95.187:443 [nonblock]
. 2018.02.23 21:10:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:25 - OpenVPN > TCP connection established with [AF_INET]199.19.95.187:443
. 2018.02.23 21:10:25 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.02.23 21:10:25 - OpenVPN > TCP_CLIENT link remote: [AF_INET]199.19.95.187:443
. 2018.02.23 21:10:26 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=79039105 d4abf50c
. 2018.02.23 21:10:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:10:26 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:10:26 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:10:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:10:26 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:10:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:10:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:10:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443
. 2018.02.23 21:10:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:10:27 - Disconnecting
. 2018.02.23 21:10:27 - Connection terminated.
I 2018.02.23 21:10:28 - Cancel requested.
. 2018.02.23 21:10:28 - IPv6 restored with packet filtering.
! 2018.02.23 21:10:28 - Session terminated.
I 2018.02.23 21:10:35 - Session starting.
. 2018.02.23 21:10:35 - IPv6 disabled with packet filtering.
I 2018.02.23 21:10:35 - Checking authorization ...
! 2018.02.23 21:10:35 - Connecting to Kraz (Canada, Toronto, Ontario)
. 2018.02.23 21:10:36 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:10:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:10:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:10:36 - Connection to OpenVPN Management Interface
. 2018.02.23 21:10:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.61:443
. 2018.02.23 21:10:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:10:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.19.94.61:443 [nonblock]
. 2018.02.23 21:10:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:37 - OpenVPN > TCP connection established with [AF_INET]199.19.94.61:443
. 2018.02.23 21:10:37 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.02.23 21:10:37 - OpenVPN > TCP_CLIENT link remote: [AF_INET]199.19.94.61:443
. 2018.02.23 21:10:37 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.61:443, sid=2f8ccf45 174cc609
. 2018.02.23 21:10:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:10:37 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:10:37 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:10:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:10:37 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:10:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:10:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:10:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.61:443
. 2018.02.23 21:10:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:10:38 - Disconnecting
. 2018.02.23 21:10:38 - Connection terminated.
I 2018.02.23 21:10:41 - Checking authorization ...
! 2018.02.23 21:10:42 - Connecting to Chort (Canada, Toronto, Ontario)
. 2018.02.23 21:10:42 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:10:42 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:10:42 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:10:42 - Connection to OpenVPN Management Interface
. 2018.02.23 21:10:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.234:443
. 2018.02.23 21:10:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:10:42 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.234:443 [nonblock]
. 2018.02.23 21:10:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:43 - OpenVPN > TCP connection established with [AF_INET]104.254.90.234:443
. 2018.02.23 21:10:43 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.02.23 21:10:43 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.234:443
. 2018.02.23 21:10:43 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.234:443, sid=7d526ee7 22d19f42
. 2018.02.23 21:10:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:10:43 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:10:43 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:10:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:10:43 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:10:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:10:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:10:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.234:443
. 2018.02.23 21:10:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:10:45 - Disconnecting
. 2018.02.23 21:10:45 - Connection terminated.
I 2018.02.23 21:10:48 - Checking authorization ...
! 2018.02.23 21:10:48 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2018.02.23 21:10:48 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:10:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:10:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:10:48 - Connection to OpenVPN Management Interface
. 2018.02.23 21:10:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:10:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
. 2018.02.23 21:10:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:10:48 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.2:443 [nonblock]
. 2018.02.23 21:10:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:10:49 - OpenVPN > TCP connection established with [AF_INET]184.75.221.2:443
. 2018.02.23 21:10:49 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.02.23 21:10:49 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.2:443
. 2018.02.23 21:10:49 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=b9661338 93913e7e
. 2018.02.23 21:10:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:10:50 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:10:50 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:10:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:10:50 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:10:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:10:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:10:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
. 2018.02.23 21:10:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:10:51 - Disconnecting
. 2018.02.23 21:10:51 - Connection terminated.
I 2018.02.23 21:10:53 - Cancel requested.
. 2018.02.23 21:10:53 - IPv6 restored with packet filtering.
! 2018.02.23 21:10:53 - Session terminated.
I 2018.02.23 21:11:03 - Session starting.
. 2018.02.23 21:11:03 - IPv6 disabled with packet filtering.
I 2018.02.23 21:11:03 - Checking authorization ...
! 2018.02.23 21:11:04 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2018.02.23 21:11:04 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:11:04 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:11:04 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:11:04 - Connection to OpenVPN Management Interface
. 2018.02.23 21:11:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:11:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:11:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:11:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.42:443
. 2018.02.23 21:11:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:11:04 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.42:443 [nonblock]
. 2018.02.23 21:11:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:11:05 - OpenVPN > TCP connection established with [AF_INET]184.75.221.42:443
. 2018.02.23 21:11:05 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.02.23 21:11:05 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.42:443
. 2018.02.23 21:11:05 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.42:443, sid=dad41901 2d6a323e
. 2018.02.23 21:11:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:11:05 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:11:05 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:11:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:11:05 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:11:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2018.02.23 21:11:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:11:05 - OpenVPN > [sualocin] Peer Connection Initiated with [AF_INET]184.75.221.42:443
. 2018.02.23 21:11:07 - OpenVPN > SENT CONTROL [sualocin]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:11:07 - Disconnecting
. 2018.02.23 21:11:07 - Connection terminated.
I 2018.02.23 21:11:10 - Checking authorization ...
! 2018.02.23 21:11:10 - Connecting to Regulus (Canada, Toronto, Ontario)
. 2018.02.23 21:11:10 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.23 21:11:10 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.23 21:11:10 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.23 21:11:10 - Connection to OpenVPN Management Interface
. 2018.02.23 21:11:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.23 21:11:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:11:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.23 21:11:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.34:443
. 2018.02.23 21:11:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.23 21:11:10 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.34:443 [nonblock]
. 2018.02.23 21:11:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.23 21:11:11 - OpenVPN > TCP connection established with [AF_INET]184.75.221.34:443
. 2018.02.23 21:11:11 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.02.23 21:11:11 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.34:443
. 2018.02.23 21:11:11 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.34:443, sid=faf98bf6 b7089084
. 2018.02.23 21:11:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.23 21:11:12 - OpenVPN > VERIFY KU OK
. 2018.02.23 21:11:12 - OpenVPN > Validating certificate extended key usage
. 2018.02.23 21:11:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.23 21:11:12 - OpenVPN > VERIFY EKU OK
. 2018.02.23 21:11:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.23 21:11:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.23 21:11:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.34:443
. 2018.02.23 21:11:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2018.02.23 21:11:13 - Disconnecting
. 2018.02.23 21:11:13 - Connection terminated.
I 2018.02.23 21:11:14 - Cancel requested.
. 2018.02.23 21:11:14 - IPv6 restored with packet filtering.
! 2018.02.23 21:11:14 - Session terminated.

Share this post


Link to post

Fixed it, somehow.

 

 

Switched back to OpenVPN client and that was telling me all TAP adapters were in use, eddie was giving same fatal error, uninstalled and reinstalled the TAP adapter software from OpenVPN and now everything is working.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...