Jump to content
Not connected, Your IP: 18.221.240.14

Recommended Posts

I have been extremely satisfied with AirVPN so far! However, there seem to be some issues all of a sudden, which I honestly cannot explain.

 

Over the past days, my internet connection all of a sudden drops on my laptop. I don't have issues on my other devices, so it's not a broader issue. When I disconnect from AirVPN, everything turns back to normal. If I then reconnect to one of the recommended servers it works again for a certain period (sometimes only minutes, sometimes hours) and then the issue returns.

 

I am absolutely clueless what the issue could be. Any ideas?

Share this post


Link to post

I have been extremely satisfied with AirVPN so far! However, there seem to be some issues all of a sudden, which I honestly cannot explain.

 

Over the past days, my internet connection all of a sudden drops on my laptop. I don't have issues on my other devices, so it's not a broader issue. When I disconnect from AirVPN, everything turns back to normal. If I then reconnect to one of the recommended servers it works again for a certain period (sometimes only minutes, sometimes hours) and then the issue returns.

 

I am absolutely clueless what the issue could be. Any ideas?

Try copying and pasting your log, so someone in the know can have a look and help you out. The best way is to type [_spoiler_], without the _ _, then copy and paste the log, then type [_/spoiler_], without the _ _. On top of your regular log, you can also repeat the above with Eddie's "system" log (click on the red lifesaver)

Share this post


Link to post

Thanks for the clear instructions, Madrat!

 

I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 
Eddie System/Environment Report - 2-3-2018 18:17 UTC
 
Eddie version: 2.13.6
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.16299.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\Thomas Nipius\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\AirVPN.exe
Command line arguments: (1 args) path="home"
Network Lock Active: No
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 10.4.0.1, 192.168.178.1
Test DNS IPv4: Ok
Test DNS IPv6: Failed
----------------------------
Test HTTP:
 
Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Test HTTPS:
 
Status: HTTP/2 200 
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Important options not at defaults:
 
login: (omissis)
password: (omissis)
remember: True
connect: True
servers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119b
gui.windows.start_minimized: True
 
----------------------------
Logs:
 
I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 
----------------------------
Network Interfaces:
 
Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - Up
Network Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - Down
Network Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - Down
Network Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - Up
Network Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - Down
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - Up
Network Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down
 
----------------------------
Default gateways:
 
192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
 
----------------------------
ipconfig /all:
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
 
Ethernet adapter Ethernet 2:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59
   Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.4.255.254
   DHCPv6 IAID . . . . . . . . . . . : 587267934
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 10.4.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Ethernet:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller
   Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter LAN-verbinding* 1:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wi-Fi:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11
   Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15
   Default Gateway . . . . . . . . . : 192.168.178.1
   DHCP Server . . . . . . . . . . . : 192.168.178.1
   DHCPv6 IAID . . . . . . . . . . . : 157291699
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 192.168.178.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Bluetooth-netwerkverbinding:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter LAN-verbinding* 11:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
----------------------------
route print:
 
===========================================================================
Interface List
  8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9
 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller
  6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter
  9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
  7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network)
  1...........................Software Loopback Interface 1
 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.178.1  192.168.178.207     35
          0.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
         10.4.0.0      255.255.0.0         On-link       10.4.27.156    259
      10.4.27.156  255.255.255.255         On-link       10.4.27.156    259
     10.4.255.255  255.255.255.255         On-link       10.4.27.156    259
   62.102.148.142  255.255.255.255    192.168.178.1  192.168.178.207     35
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
        128.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
    192.168.178.0    255.255.255.0         On-link   192.168.178.207    291
  192.168.178.207  255.255.255.255         On-link   192.168.178.207    291
  192.168.178.255  255.255.255.255         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link       10.4.27.156    259
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link   192.168.178.207    291
  255.255.255.255  255.255.255.255         On-link       10.4.27.156    259
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    331 ::1/128                  On-link
  9    291 fe80::/64                On-link
  8    259 fe80::/64                On-link
  8    259 fe80::cc8c:47c:fc8e:f486/128
                                    On-link
  9    291 fe80::f18e:31bc:2ccf:1841/128
                                    On-link
  1    331 ff00::/8                 On-link
  9    291 ff00::/8                 On-link
  8    259 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
 
Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps.

Share this post


Link to post

 

Thanks for the clear instructions, Madrat!

 

I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 

Eddie System/Environment Report - 2-3-2018 18:17 UTC
 
Eddie version: 2.13.6
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.16299.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\Thomas Nipius\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\AirVPN.exe
Command line arguments: (1 args) path="home"
Network Lock Active: No
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 10.4.0.1, 192.168.178.1
Test DNS IPv4: Ok
Test DNS IPv6: Failed
----------------------------
Test HTTP:
 
Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Test HTTPS:
 
Status: HTTP/2 200 
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Important options not at defaults:
 
login: (omissis)
password: (omissis)
remember: True
connect: True
servers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119b
gui.windows.start_minimized: True
 
----------------------------
Logs:
 
I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 
----------------------------
Network Interfaces:
 
Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - Up
Network Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - Down
Network Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - Down
Network Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - Up
Network Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - Down
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - Up
Network Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down
 
----------------------------
Default gateways:
 
192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
 
----------------------------
ipconfig /all:
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
 
Ethernet adapter Ethernet 2:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59
   Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.4.255.254
   DHCPv6 IAID . . . . . . . . . . . : 587267934
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 10.4.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Ethernet:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller
   Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter LAN-verbinding* 1:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wi-Fi:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11
   Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15
   Default Gateway . . . . . . . . . : 192.168.178.1
   DHCP Server . . . . . . . . . . . : 192.168.178.1
   DHCPv6 IAID . . . . . . . . . . . : 157291699
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 192.168.178.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Bluetooth-netwerkverbinding:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter LAN-verbinding* 11:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
----------------------------
route print:
 
===========================================================================
Interface List
  8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9
 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller
  6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter
  9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
  7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network)
  1...........................Software Loopback Interface 1
 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.178.1  192.168.178.207     35
          0.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
         10.4.0.0      255.255.0.0         On-link       10.4.27.156    259
      10.4.27.156  255.255.255.255         On-link       10.4.27.156    259
     10.4.255.255  255.255.255.255         On-link       10.4.27.156    259
   62.102.148.142  255.255.255.255    192.168.178.1  192.168.178.207     35
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
        128.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
    192.168.178.0    255.255.255.0         On-link   192.168.178.207    291
  192.168.178.207  255.255.255.255         On-link   192.168.178.207    291
  192.168.178.255  255.255.255.255         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link       10.4.27.156    259
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link   192.168.178.207    291
  255.255.255.255  255.255.255.255         On-link       10.4.27.156    259
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    331 ::1/128                  On-link
  9    291 fe80::/64                On-link
  8    259 fe80::/64                On-link
  8    259 fe80::cc8c:47c:fc8e:f486/128
                                    On-link
  9    291 fe80::f18e:31bc:2ccf:1841/128
                                    On-link
  1    331 ff00::/8                 On-link
  9    291 ff00::/8                 On-link
  8    259 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
 
Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps.

If none of the users here can help you, perhaps you should issue a ticket to staff and include the same logs. Submit a ticket in the "Client Area" if you didn't already know. As well, I see you are running 2.13.6. You could try updating to 2.14 Beta and see if that helps.

Share this post


Link to post

 

 

Thanks for the clear instructions, Madrat!

 

I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 

Eddie System/Environment Report - 2-3-2018 18:17 UTC
 
Eddie version: 2.13.6
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.16299.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\Thomas Nipius\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\AirVPN.exe
Command line arguments: (1 args) path="home"
Network Lock Active: No
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 10.4.0.1, 192.168.178.1
Test DNS IPv4: Ok
Test DNS IPv6: Failed
----------------------------
Test HTTP:
 
Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Test HTTPS:
 
Status: HTTP/2 200 
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Important options not at defaults:
 
login: (omissis)
password: (omissis)
remember: True
connect: True
servers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119b
gui.windows.start_minimized: True
 
----------------------------
Logs:
 
I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 
----------------------------
Network Interfaces:
 
Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - Up
Network Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - Down
Network Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - Down
Network Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - Up
Network Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - Down
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - Up
Network Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down
 
----------------------------
Default gateways:
 
192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
 
----------------------------
ipconfig /all:
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
 
Ethernet adapter Ethernet 2:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59
   Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.4.255.254
   DHCPv6 IAID . . . . . . . . . . . : 587267934
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 10.4.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Ethernet:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller
   Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter LAN-verbinding* 1:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wi-Fi:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11
   Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15
   Default Gateway . . . . . . . . . : 192.168.178.1
   DHCP Server . . . . . . . . . . . : 192.168.178.1
   DHCPv6 IAID . . . . . . . . . . . : 157291699
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 192.168.178.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Bluetooth-netwerkverbinding:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter LAN-verbinding* 11:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
----------------------------
route print:
 
===========================================================================
Interface List
  8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9
 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller
  6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter
  9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
  7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network)
  1...........................Software Loopback Interface 1
 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.178.1  192.168.178.207     35
          0.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
         10.4.0.0      255.255.0.0         On-link       10.4.27.156    259
      10.4.27.156  255.255.255.255         On-link       10.4.27.156    259
     10.4.255.255  255.255.255.255         On-link       10.4.27.156    259
   62.102.148.142  255.255.255.255    192.168.178.1  192.168.178.207     35
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
        128.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
    192.168.178.0    255.255.255.0         On-link   192.168.178.207    291
  192.168.178.207  255.255.255.255         On-link   192.168.178.207    291
  192.168.178.255  255.255.255.255         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link       10.4.27.156    259
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link   192.168.178.207    291
  255.255.255.255  255.255.255.255         On-link       10.4.27.156    259
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    331 ::1/128                  On-link
  9    291 fe80::/64                On-link
  8    259 fe80::/64                On-link
  8    259 fe80::cc8c:47c:fc8e:f486/128
                                    On-link
  9    291 fe80::f18e:31bc:2ccf:1841/128
                                    On-link
  1    331 ff00::/8                 On-link
  9    291 ff00::/8                 On-link
  8    259 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
 
Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps.

If none of the users here can help you, perhaps you should issue a ticket to staff and include the same logs. Submit a ticket in the "Client Area" if you didn't already know. As well, I see you are running 2.13.6. You could try updating to 2.14 Beta and see if that helps.

 

Thanks again, madrat. I will first update the software. If that doesn't solve the issue and if there are no responses by the end of the weekend, I'll contact the staff directly.

 

Your help is much appreciated!

Share this post


Link to post

 

 

 

Thanks for the clear instructions, Madrat!

 

I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 

Eddie System/Environment Report - 2-3-2018 18:17 UTC
 
Eddie version: 2.13.6
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.16299.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\Thomas Nipius\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\AirVPN.exe
Command line arguments: (1 args) path="home"
Network Lock Active: No
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 10.4.0.1, 192.168.178.1
Test DNS IPv4: Ok
Test DNS IPv6: Failed
----------------------------
Test HTTP:
 
Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Test HTTPS:
 
Status: HTTP/2 200 
 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.
 
----------------------------
Important options not at defaults:
 
login: (omissis)
password: (omissis)
remember: True
connect: True
servers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119b
gui.windows.start_minimized: True
 
----------------------------
Logs:
 
I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.02 15:24:33 - Command line arguments (1): path="home"
I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.03.02 15:24:36 - Recovery. Unexpected crash?
. 2018.03.02 15:24:40 - Updating systems & servers data ...
I 2018.03.02 15:24:40 - Session starting.
. 2018.03.02 15:24:42 - Systems & servers data update completed
. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.
I 2018.03.02 15:24:46 - Checking authorization ...
! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam)
. 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443
. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:24:57 - OpenVPN > open_tun
. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:25:03 - Flushing DNS
I 2018.03.02 15:25:06 - Checking route
I 2018.03.02 15:25:08 - Checking DNS
! 2018.03.02 15:25:20 - Connected.
. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:34:46 - Updating systems & servers data ...
. 2018.03.02 15:34:55 - Systems & servers data update completed
! 2018.03.02 15:39:37 - Disconnecting
. 2018.03.02 15:39:37 - Sending management termination signal
. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:39:42 - Connection terminated.
. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 15:39:42 - Flushing DNS
. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.
! 2018.03.02 15:39:45 - Session terminated.
I 2018.03.02 15:40:22 - Session starting.
. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.
I 2018.03.02 15:40:22 - Checking authorization ...
! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:40:25 - OpenVPN > open_tun
. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:40:30 - Flushing DNS
I 2018.03.02 15:40:34 - Checking route
I 2018.03.02 15:40:34 - Checking DNS
! 2018.03.02 15:40:47 - Connected.
. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 15:44:57 - Updating systems & servers data ...
. 2018.03.02 15:44:58 - Systems & servers data update completed
. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]
. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe
. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface
. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden.   (code=2)
. 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting
. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)
! 2018.03.02 15:55:02 - Disconnecting
. 2018.03.02 15:55:02 - Sending management termination signal
. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'
. 2018.03.02 15:55:02 - Connection terminated.
. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.
I 2018.03.02 15:55:08 - Checking authorization ...
! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK
. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK
. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 15:55:12 - OpenVPN > open_tun
. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 15:55:13 - Updating systems & servers data ...
. 2018.03.02 15:55:14 - Systems & servers data update completed
. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.
. 2018.03.02 15:55:18 - Flushing DNS
I 2018.03.02 15:55:21 - Checking route
I 2018.03.02 15:55:22 - Checking DNS
! 2018.03.02 15:55:34 - Connected.
. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed
. 2018.03.02 16:05:16 - Updating systems & servers data ...
. 2018.03.02 16:05:18 - Systems & servers data update completed
. 2018.03.02 16:15:20 - Updating systems & servers data ...
. 2018.03.02 16:15:21 - Systems & servers data update completed
. 2018.03.02 16:25:24 - Updating systems & servers data ...
. 2018.03.02 16:25:25 - Systems & servers data update completed
! 2018.03.02 16:34:00 - Disconnecting
. 2018.03.02 16:34:00 - Sending management termination signal
. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'
. 2018.03.02 16:34:06 - Connection terminated.
. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.03.02 16:34:06 - Flushing DNS
. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.
! 2018.03.02 16:34:09 - Session terminated.
. 2018.03.02 16:35:28 - Updating systems & servers data ...
. 2018.03.02 16:35:28 - Systems & servers data update completed
. 2018.03.02 16:45:31 - Updating systems & servers data ...
. 2018.03.02 16:45:32 - Systems & servers data update completed
. 2018.03.02 16:55:34 - Updating systems & servers data ...
. 2018.03.02 16:55:35 - Systems & servers data update completed
. 2018.03.02 17:05:38 - Updating systems & servers data ...
. 2018.03.02 17:05:39 - Systems & servers data update completed
I 2018.03.02 17:10:12 - Session starting.
. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.
I 2018.03.02 17:10:12 - Checking authorization ...
! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK
. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK
. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 17:10:14 - OpenVPN > open_tun
. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.
. 2018.03.02 17:10:20 - Flushing DNS
I 2018.03.02 17:10:23 - Checking route
I 2018.03.02 17:10:23 - Checking DNS
. 2018.03.02 19:13:24 - Updating systems & servers data ...
. 2018.03.02 19:13:25 - Systems & servers data update completed
. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:31 - Checking DNS (2° try)
. 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org
. 2018.03.02 19:13:45 - Checking DNS (3° try)
. 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.org
E 2018.03.02 19:13:47 - Checking DNS failed.
. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed
! 2018.03.02 19:13:47 - Disconnecting
. 2018.03.02 19:13:47 - Sending management termination signal
. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'
. 2018.03.02 19:13:52 - Connection terminated.
. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.
I 2018.03.02 19:13:58 - Checking authorization ...
! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala)
. 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound)
. 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK
. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage
. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK
. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443
. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0
. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed
. 2018.03.02 19:13:59 - OpenVPN > open_tun
. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap
. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]
. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}
. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.
. 2018.03.02 19:14:04 - Flushing DNS
I 2018.03.02 19:14:07 - Checking route
I 2018.03.02 19:14:08 - Checking DNS
! 2018.03.02 19:14:21 - Connected.
. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed
 
----------------------------
Network Interfaces:
 
Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - Up
Network Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - Down
Network Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - Down
Network Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - Up
Network Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - Down
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - Up
Network Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down
 
----------------------------
Default gateways:
 
192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
 
----------------------------
ipconfig /all:
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
 
Ethernet adapter Ethernet 2:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59
   Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.4.255.254
   DHCPv6 IAID . . . . . . . . . . . : 587267934
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 10.4.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Ethernet:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller
   Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter LAN-verbinding* 1:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wi-Fi:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11
   Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15
   Default Gateway . . . . . . . . . : 192.168.178.1
   DHCP Server . . . . . . . . . . . : 192.168.178.1
   DHCPv6 IAID . . . . . . . . . . . : 157291699
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9
   DNS Servers . . . . . . . . . . . : 192.168.178.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Bluetooth-netwerkverbinding:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter LAN-verbinding* 11:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
----------------------------
route print:
 
===========================================================================
Interface List
  8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9
 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller
  6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter
  9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
  7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network)
  1...........................Software Loopback Interface 1
 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.178.1  192.168.178.207     35
          0.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
         10.4.0.0      255.255.0.0         On-link       10.4.27.156    259
      10.4.27.156  255.255.255.255         On-link       10.4.27.156    259
     10.4.255.255  255.255.255.255         On-link       10.4.27.156    259
   62.102.148.142  255.255.255.255    192.168.178.1  192.168.178.207     35
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
        128.0.0.0        128.0.0.0         10.4.0.1      10.4.27.156      3
    192.168.178.0    255.255.255.0         On-link   192.168.178.207    291
  192.168.178.207  255.255.255.255         On-link   192.168.178.207    291
  192.168.178.255  255.255.255.255         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link   192.168.178.207    291
        224.0.0.0        240.0.0.0         On-link       10.4.27.156    259
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link   192.168.178.207    291
  255.255.255.255  255.255.255.255         On-link       10.4.27.156    259
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    331 ::1/128                  On-link
  9    291 fe80::/64                On-link
  8    259 fe80::/64                On-link
  8    259 fe80::cc8c:47c:fc8e:f486/128
                                    On-link
  9    291 fe80::f18e:31bc:2ccf:1841/128
                                    On-link
  1    331 ff00::/8                 On-link
  9    291 ff00::/8                 On-link
  8    259 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
 
Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps.

If none of the users here can help you, perhaps you should issue a ticket to staff and include the same logs. Submit a ticket in the "Client Area" if you didn't already know. As well, I see you are running 2.13.6. You could try updating to 2.14 Beta and see if that helps.

 

Thanks again, madrat. I will first update the software. If that doesn't solve the issue and if there are no responses by the end of the weekend, I'll contact the staff directly.

 

Your help is much appreciated!

 

Just curious if this problem was resolved or not?

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...