N1P1U5 2 Posted ... I have been extremely satisfied with AirVPN so far! However, there seem to be some issues all of a sudden, which I honestly cannot explain. Over the past days, my internet connection all of a sudden drops on my laptop. I don't have issues on my other devices, so it's not a broader issue. When I disconnect from AirVPN, everything turns back to normal. If I then reconnect to one of the recommended servers it works again for a certain period (sometimes only minutes, sometimes hours) and then the issue returns. I am absolutely clueless what the issue could be. Any ideas? Quote Share this post Link to post
madrat 19 Posted ... I have been extremely satisfied with AirVPN so far! However, there seem to be some issues all of a sudden, which I honestly cannot explain. Over the past days, my internet connection all of a sudden drops on my laptop. I don't have issues on my other devices, so it's not a broader issue. When I disconnect from AirVPN, everything turns back to normal. If I then reconnect to one of the recommended servers it works again for a certain period (sometimes only minutes, sometimes hours) and then the issue returns. I am absolutely clueless what the issue could be. Any ideas?Try copying and pasting your log, so someone in the know can have a look and help you out. The best way is to type [_spoiler_], without the _ _, then copy and paste the log, then type [_/spoiler_], without the _ _. On top of your regular log, you can also repeat the above with Eddie's "system" log (click on the red lifesaver) 1 N1P1U5 reacted to this Quote Share this post Link to post
N1P1U5 2 Posted ... Thanks for the clear instructions, Madrat! I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed Eddie System/Environment Report - 2-3-2018 18:17 UTC Eddie version: 2.13.6Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 HomeOS version: Microsoft Windows NT 10.0.16299.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2OpenVPN: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xmlData path: C:\Users\Thomas Nipius\AppData\Local\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\AirVPN.exeCommand line arguments: (1 args) path="home"Network Lock Active: NoConnected to VPN: Yes, Eddie.Core.StatsEntryDetected DNS: 10.4.0.1, 192.168.178.1Test DNS IPv4: OkTest DNS IPv6: Failed----------------------------Test HTTP: Status: HTTP/1.1 200 OK - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Test HTTPS: Status: HTTP/2 200 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: Trueconnect: Trueservers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119bgui.windows.start_minimized: True ----------------------------Logs: I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed ----------------------------Network Interfaces: Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - UpNetwork Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - DownNetwork Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - DownNetwork Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - UpNetwork Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - DownNetwork Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - UpNetwork Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down ----------------------------Default gateways: 192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC ----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59 Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00 Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.4.255.254 DHCPv6 IAID . . . . . . . . . . . : 587267934 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 10.4.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter LAN-verbinding* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11 Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15 Default Gateway . . . . . . . . . : 192.168.178.1 DHCP Server . . . . . . . . . . . : 192.168.178.1 DHCPv6 IAID . . . . . . . . . . . : 157291699 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 192.168.178.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth-netwerkverbinding: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter LAN-verbinding* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes----------------------------route print: ===========================================================================Interface List 8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller 6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter 9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC 7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network) 1...........................Software Loopback Interface 1 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter=========================================================================== IPv4 Route Table===========================================================================Active Routes:Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.178.1 192.168.178.207 35 0.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 10.4.0.0 255.255.0.0 On-link 10.4.27.156 259 10.4.27.156 255.255.255.255 On-link 10.4.27.156 259 10.4.255.255 255.255.255.255 On-link 10.4.27.156 259 62.102.148.142 255.255.255.255 192.168.178.1 192.168.178.207 35 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 128.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 192.168.178.0 255.255.255.0 On-link 192.168.178.207 291 192.168.178.207 255.255.255.255 On-link 192.168.178.207 291 192.168.178.255 255.255.255.255 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 10.4.27.156 259 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331 255.255.255.255 255.255.255.255 On-link 192.168.178.207 291 255.255.255.255 255.255.255.255 On-link 10.4.27.156 259===========================================================================Persistent Routes: None IPv6 Route Table===========================================================================Active Routes: If Metric Network Destination Gateway 1 331 ::1/128 On-link 9 291 fe80::/64 On-link 8 259 fe80::/64 On-link 8 259 fe80::cc8c:47c:fc8e:f486/128 On-link 9 291 fe80::f18e:31bc:2ccf:1841/128 On-link 1 331 ff00::/8 On-link 9 291 ff00::/8 On-link 8 259 ff00::/8 On-link===========================================================================Persistent Routes: None Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps. 1 madrat reacted to this Quote Share this post Link to post
madrat 19 Posted ... Thanks for the clear instructions, Madrat! I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed Eddie System/Environment Report - 2-3-2018 18:17 UTC Eddie version: 2.13.6Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 HomeOS version: Microsoft Windows NT 10.0.16299.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2OpenVPN: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xmlData path: C:\Users\Thomas Nipius\AppData\Local\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\AirVPN.exeCommand line arguments: (1 args) path="home"Network Lock Active: NoConnected to VPN: Yes, Eddie.Core.StatsEntryDetected DNS: 10.4.0.1, 192.168.178.1Test DNS IPv4: OkTest DNS IPv6: Failed----------------------------Test HTTP: Status: HTTP/1.1 200 OK - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Test HTTPS: Status: HTTP/2 200 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: Trueconnect: Trueservers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119bgui.windows.start_minimized: True ----------------------------Logs: I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed ----------------------------Network Interfaces: Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - UpNetwork Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - DownNetwork Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - DownNetwork Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - UpNetwork Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - DownNetwork Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - UpNetwork Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down ----------------------------Default gateways: 192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC ----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59 Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00 Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.4.255.254 DHCPv6 IAID . . . . . . . . . . . : 587267934 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 10.4.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter LAN-verbinding* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11 Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15 Default Gateway . . . . . . . . . : 192.168.178.1 DHCP Server . . . . . . . . . . . : 192.168.178.1 DHCPv6 IAID . . . . . . . . . . . : 157291699 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 192.168.178.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth-netwerkverbinding: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter LAN-verbinding* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes----------------------------route print: ===========================================================================Interface List 8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller 6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter 9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC 7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network) 1...........................Software Loopback Interface 1 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter=========================================================================== IPv4 Route Table===========================================================================Active Routes:Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.178.1 192.168.178.207 35 0.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 10.4.0.0 255.255.0.0 On-link 10.4.27.156 259 10.4.27.156 255.255.255.255 On-link 10.4.27.156 259 10.4.255.255 255.255.255.255 On-link 10.4.27.156 259 62.102.148.142 255.255.255.255 192.168.178.1 192.168.178.207 35 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 128.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 192.168.178.0 255.255.255.0 On-link 192.168.178.207 291 192.168.178.207 255.255.255.255 On-link 192.168.178.207 291 192.168.178.255 255.255.255.255 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 10.4.27.156 259 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331 255.255.255.255 255.255.255.255 On-link 192.168.178.207 291 255.255.255.255 255.255.255.255 On-link 10.4.27.156 259===========================================================================Persistent Routes: None IPv6 Route Table===========================================================================Active Routes: If Metric Network Destination Gateway 1 331 ::1/128 On-link 9 291 fe80::/64 On-link 8 259 fe80::/64 On-link 8 259 fe80::cc8c:47c:fc8e:f486/128 On-link 9 291 fe80::f18e:31bc:2ccf:1841/128 On-link 1 331 ff00::/8 On-link 9 291 ff00::/8 On-link 8 259 ff00::/8 On-link===========================================================================Persistent Routes: None Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps.If none of the users here can help you, perhaps you should issue a ticket to staff and include the same logs. Submit a ticket in the "Client Area" if you didn't already know. As well, I see you are running 2.13.6. You could try updating to 2.14 Beta and see if that helps. Quote Share this post Link to post
N1P1U5 2 Posted ... Thanks for the clear instructions, Madrat! I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed Eddie System/Environment Report - 2-3-2018 18:17 UTC Eddie version: 2.13.6Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 HomeOS version: Microsoft Windows NT 10.0.16299.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2OpenVPN: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xmlData path: C:\Users\Thomas Nipius\AppData\Local\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\AirVPN.exeCommand line arguments: (1 args) path="home"Network Lock Active: NoConnected to VPN: Yes, Eddie.Core.StatsEntryDetected DNS: 10.4.0.1, 192.168.178.1Test DNS IPv4: OkTest DNS IPv6: Failed----------------------------Test HTTP: Status: HTTP/1.1 200 OK - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Test HTTPS: Status: HTTP/2 200 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: Trueconnect: Trueservers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119bgui.windows.start_minimized: True ----------------------------Logs: I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed ----------------------------Network Interfaces: Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - UpNetwork Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - DownNetwork Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - DownNetwork Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - UpNetwork Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - DownNetwork Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - UpNetwork Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down ----------------------------Default gateways: 192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC ----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59 Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00 Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.4.255.254 DHCPv6 IAID . . . . . . . . . . . : 587267934 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 10.4.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter LAN-verbinding* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11 Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15 Default Gateway . . . . . . . . . : 192.168.178.1 DHCP Server . . . . . . . . . . . : 192.168.178.1 DHCPv6 IAID . . . . . . . . . . . : 157291699 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 192.168.178.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth-netwerkverbinding: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter LAN-verbinding* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes----------------------------route print: ===========================================================================Interface List 8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller 6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter 9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC 7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network) 1...........................Software Loopback Interface 1 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter=========================================================================== IPv4 Route Table===========================================================================Active Routes:Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.178.1 192.168.178.207 35 0.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 10.4.0.0 255.255.0.0 On-link 10.4.27.156 259 10.4.27.156 255.255.255.255 On-link 10.4.27.156 259 10.4.255.255 255.255.255.255 On-link 10.4.27.156 259 62.102.148.142 255.255.255.255 192.168.178.1 192.168.178.207 35 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 128.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 192.168.178.0 255.255.255.0 On-link 192.168.178.207 291 192.168.178.207 255.255.255.255 On-link 192.168.178.207 291 192.168.178.255 255.255.255.255 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 10.4.27.156 259 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331 255.255.255.255 255.255.255.255 On-link 192.168.178.207 291 255.255.255.255 255.255.255.255 On-link 10.4.27.156 259===========================================================================Persistent Routes: None IPv6 Route Table===========================================================================Active Routes: If Metric Network Destination Gateway 1 331 ::1/128 On-link 9 291 fe80::/64 On-link 8 259 fe80::/64 On-link 8 259 fe80::cc8c:47c:fc8e:f486/128 On-link 9 291 fe80::f18e:31bc:2ccf:1841/128 On-link 1 331 ff00::/8 On-link 9 291 ff00::/8 On-link 8 259 ff00::/8 On-link===========================================================================Persistent Routes: None Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps.If none of the users here can help you, perhaps you should issue a ticket to staff and include the same logs. Submit a ticket in the "Client Area" if you didn't already know. As well, I see you are running 2.13.6. You could try updating to 2.14 Beta and see if that helps. Thanks again, madrat. I will first update the software. If that doesn't solve the issue and if there are no responses by the end of the weekend, I'll contact the staff directly. Your help is much appreciated! 1 madrat reacted to this Quote Share this post Link to post
madrat 19 Posted ... Thanks for the clear instructions, Madrat! I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed Eddie System/Environment Report - 2-3-2018 18:17 UTC Eddie version: 2.13.6Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 HomeOS version: Microsoft Windows NT 10.0.16299.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2OpenVPN: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xmlData path: C:\Users\Thomas Nipius\AppData\Local\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\AirVPN.exeCommand line arguments: (1 args) path="home"Network Lock Active: NoConnected to VPN: Yes, Eddie.Core.StatsEntryDetected DNS: 10.4.0.1, 192.168.178.1Test DNS IPv4: OkTest DNS IPv6: Failed----------------------------Test HTTP: Status: HTTP/1.1 200 OK - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:15 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Test HTTPS: Status: HTTP/2 200 - Headers: server:nginx;date:Fri, 02 Mar 2018 18:17:16 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: Trueconnect: Trueservers.whitelist: 23102a898cc21586422d7e0714f7d070a09837a76a933095aa56375114d9119bgui.windows.start_minimized: True ----------------------------Logs: I 2018.03.02 15:24:30 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.03.02 15:24:30 - Reading options from C:\Users\Thomas Nipius\AppData\Local\AirVPN\AirVPN.xml. 2018.03.02 15:24:33 - Command line arguments (1): path="home"I 2018.03.02 15:24:35 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.03.02 15:24:35 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.03.02 15:24:35 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.03.02 15:24:35 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.03.02 15:24:35 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.03.02 15:24:35 - Certification Authorities: C:\Program Files\AirVPN\cacert.pemW 2018.03.02 15:24:36 - Recovery. Unexpected crash?. 2018.03.02 15:24:40 - Updating systems & servers data ...I 2018.03.02 15:24:40 - Session starting.. 2018.03.02 15:24:42 - Systems & servers data update completed. 2018.03.02 15:24:43 - IPv6 disabled with packet filtering.I 2018.03.02 15:24:46 - Checking authorization ...! 2018.03.02 15:24:46 - Connecting to Alzirr (Netherlands, Alblasserdam). 2018.03.02 15:24:47 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:24:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:24:47 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:24:47 - Connection to OpenVPN Management Interface. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:24:47 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:24:47 - OpenVPN > UDP link remote: [AF_INET]109.202.107.14:443. 2018.03.02 15:24:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:24:47 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.14:443, sid=ec90e120 4a6b6149. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:24:50 - OpenVPN > VERIFY KU OK. 2018.03.02 15:24:50 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:24:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:24:50 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:24:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:24:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.14:443. 2018.03.02 15:24:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:24:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.31 255.255.0.0'. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:24:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.03.02 15:24:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:24:57 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:24:57 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:24:57 - OpenVPN > open_tun. 2018.03.02 15:24:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:24:57 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:24:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.31/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:24:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.31/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:24:57 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:24:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:25:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.14 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:02 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:25:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:25:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:25:03 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:25:03 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:25:03 - Flushing DNSI 2018.03.02 15:25:06 - Checking routeI 2018.03.02 15:25:08 - Checking DNS! 2018.03.02 15:25:20 - Connected.. 2018.03.02 15:25:20 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:34:46 - Updating systems & servers data .... 2018.03.02 15:34:55 - Systems & servers data update completed! 2018.03.02 15:39:37 - Disconnecting. 2018.03.02 15:39:37 - Sending management termination signal. 2018.03.02 15:39:37 - Management - Send 'signal SIGTERM'. 2018.03.02 15:39:42 - Connection terminated.. 2018.03.02 15:39:42 - DNS leak protection with packet filtering disabled.. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 15:39:42 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 15:39:42 - Flushing DNS. 2018.03.02 15:39:45 - IPv6 restored with packet filtering.! 2018.03.02 15:39:45 - Session terminated.I 2018.03.02 15:40:22 - Session starting.. 2018.03.02 15:40:22 - IPv6 disabled with packet filtering.I 2018.03.02 15:40:22 - Checking authorization ...! 2018.03.02 15:40:23 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:40:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:40:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:40:23 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:40:23 - Connection to OpenVPN Management Interface. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:40:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:40:23 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:40:23 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:40:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:40:23 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=e5f73b4a f9d7894d. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:40:23 - OpenVPN > VERIFY KU OK. 2018.03.02 15:40:23 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:40:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:40:23 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:40:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:40:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:40:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:40:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:40:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:40:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:40:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:40:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:40:25 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:40:25 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:40:25 - OpenVPN > open_tun. 2018.03.02 15:40:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:40:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:40:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:40:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:40:25 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:40:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:40:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:40:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:40:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:40:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:40:30 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:40:30 - Flushing DNSI 2018.03.02 15:40:34 - Checking routeI 2018.03.02 15:40:34 - Checking DNS! 2018.03.02 15:40:47 - Connected.. 2018.03.02 15:40:47 - OpenVPN > Initialization Sequence Completed. 2018.03.02 15:44:57 - Updating systems & servers data .... 2018.03.02 15:44:58 - Systems & servers data update completed. 2018.03.02 15:54:47 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.03.02 15:55:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:01 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2018.03.02 15:55:02 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2018.03.02 15:55:02 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2018.03.02 15:55:02 - OpenVPN > Route deletion fallback to route.exe. 2018.03.02 15:55:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.03.02 15:55:02 - OpenVPN > Closing TUN/TAP interface. 2018.03.02 15:55:02 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: Het systeem kan het opgegeven bestand niet vinden. (code=2). 2018.03.02 15:55:02 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2018.03.02 15:55:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:02 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:02 - OpenVPN > Restart pause, 10 second(s)! 2018.03.02 15:55:02 - Disconnecting. 2018.03.02 15:55:02 - Sending management termination signal. 2018.03.02 15:55:02 - Management - Send 'signal SIGTERM'. 2018.03.02 15:55:02 - Connection terminated.. 2018.03.02 15:55:02 - DNS leak protection with packet filtering disabled.I 2018.03.02 15:55:08 - Checking authorization ...! 2018.03.02 15:55:08 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 15:55:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 15:55:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 15:55:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 15:55:09 - Connection to OpenVPN Management Interface. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 15:55:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 15:55:09 - OpenVPN > UDP link local: (not bound). 2018.03.02 15:55:09 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 15:55:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 15:55:09 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=8f1d9d9f c70ba4d5. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > VERIFY KU OK. 2018.03.02 15:55:09 - OpenVPN > Validating certificate extended key usage. 2018.03.02 15:55:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 15:55:09 - OpenVPN > VERIFY EKU OK. 2018.03.02 15:55:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 15:55:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 15:55:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 15:55:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 15:55:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 54,cipher AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 15:55:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 15:55:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 15:55:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 15:55:12 - OpenVPN > interactive service msg_channel=0. 2018.03.02 15:55:12 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 15:55:12 - OpenVPN > open_tun. 2018.03.02 15:55:12 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 15:55:12 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 15:55:12 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 15:55:12 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 15:55:12 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 15:55:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 15:55:13 - Updating systems & servers data .... 2018.03.02 15:55:14 - Systems & servers data update completed. 2018.03.02 15:55:17 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 15:55:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:17 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 15:55:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 15:55:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 15:55:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 15:55:18 - DNS leak protection with packet filtering enabled.. 2018.03.02 15:55:18 - Flushing DNSI 2018.03.02 15:55:21 - Checking routeI 2018.03.02 15:55:22 - Checking DNS! 2018.03.02 15:55:34 - Connected.. 2018.03.02 15:55:34 - OpenVPN > Initialization Sequence Completed. 2018.03.02 16:05:16 - Updating systems & servers data .... 2018.03.02 16:05:18 - Systems & servers data update completed. 2018.03.02 16:15:20 - Updating systems & servers data .... 2018.03.02 16:15:21 - Systems & servers data update completed. 2018.03.02 16:25:24 - Updating systems & servers data .... 2018.03.02 16:25:25 - Systems & servers data update completed! 2018.03.02 16:34:00 - Disconnecting. 2018.03.02 16:34:00 - Sending management termination signal. 2018.03.02 16:34:00 - Management - Send 'signal SIGTERM'. 2018.03.02 16:34:06 - Connection terminated.. 2018.03.02 16:34:06 - DNS leak protection with packet filtering disabled.. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.03.02 16:34:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.03.02 16:34:06 - Flushing DNS. 2018.03.02 16:34:09 - IPv6 restored with packet filtering.! 2018.03.02 16:34:09 - Session terminated.. 2018.03.02 16:35:28 - Updating systems & servers data .... 2018.03.02 16:35:28 - Systems & servers data update completed. 2018.03.02 16:45:31 - Updating systems & servers data .... 2018.03.02 16:45:32 - Systems & servers data update completed. 2018.03.02 16:55:34 - Updating systems & servers data .... 2018.03.02 16:55:35 - Systems & servers data update completed. 2018.03.02 17:05:38 - Updating systems & servers data .... 2018.03.02 17:05:39 - Systems & servers data update completedI 2018.03.02 17:10:12 - Session starting.. 2018.03.02 17:10:12 - IPv6 disabled with packet filtering.I 2018.03.02 17:10:12 - Checking authorization ...! 2018.03.02 17:10:12 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 17:10:12 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 17:10:12 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 17:10:12 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 17:10:12 - Connection to OpenVPN Management Interface. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 17:10:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 17:10:12 - OpenVPN > UDP link local: (not bound). 2018.03.02 17:10:12 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 17:10:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 17:10:12 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=352808c9 e5320379. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > VERIFY KU OK. 2018.03.02 17:10:13 - OpenVPN > Validating certificate extended key usage. 2018.03.02 17:10:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 17:10:13 - OpenVPN > VERIFY EKU OK. 2018.03.02 17:10:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 17:10:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 17:10:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 17:10:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 17:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 17:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 17:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 17:10:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 17:10:14 - OpenVPN > interactive service msg_channel=0. 2018.03.02 17:10:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 17:10:14 - OpenVPN > open_tun. 2018.03.02 17:10:14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 17:10:14 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 17:10:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 17:10:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 17:10:14 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 17:10:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 17:10:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:19 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 17:10:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 17:10:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 17:10:20 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 17:10:20 - DNS leak protection with packet filtering enabled.. 2018.03.02 17:10:20 - Flushing DNSI 2018.03.02 17:10:23 - Checking routeI 2018.03.02 17:10:23 - Checking DNS. 2018.03.02 19:13:24 - Updating systems & servers data .... 2018.03.02 19:13:25 - Systems & servers data update completed. 2018.03.02 19:13:31 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:31 - Checking DNS (2° try). 2018.03.02 19:13:45 - curl: (6) Could not resolve host: algieba_exit.airservers.org. 2018.03.02 19:13:45 - Checking DNS (3° try). 2018.03.02 19:13:47 - curl: (6) Could not resolve host: algieba_exit.airservers.orgE 2018.03.02 19:13:47 - Checking DNS failed.. 2018.03.02 19:13:47 - OpenVPN > Initialization Sequence Completed! 2018.03.02 19:13:47 - Disconnecting. 2018.03.02 19:13:47 - Sending management termination signal. 2018.03.02 19:13:47 - Management - Send 'signal SIGTERM'. 2018.03.02 19:13:52 - Connection terminated.. 2018.03.02 19:13:52 - DNS leak protection with packet filtering disabled.I 2018.03.02 19:13:58 - Checking authorization ...! 2018.03.02 19:13:58 - Connecting to Algieba (Sweden, Uppsala). 2018.03.02 19:13:58 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.03.02 19:13:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.03.02 19:13:58 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.03.02 19:13:58 - Connection to OpenVPN Management Interface. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.03.02 19:13:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.03.02 19:13:58 - OpenVPN > UDP link local: (not bound). 2018.03.02 19:13:58 - OpenVPN > UDP link remote: [AF_INET]62.102.148.142:443. 2018.03.02 19:13:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.03.02 19:13:58 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=7fa1f453 c63f7e4c. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > VERIFY KU OK. 2018.03.02 19:13:58 - OpenVPN > Validating certificate extended key usage. 2018.03.02 19:13:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.03.02 19:13:58 - OpenVPN > VERIFY EKU OK. 2018.03.02 19:13:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.03.02 19:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.03.02 19:13:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443. 2018.03.02 19:13:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.03.02 19:13:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.156 255.255.0.0,peer-id 32,cipher AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.03.02 19:13:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.03.02 19:13:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.03.02 19:13:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.03.02 19:13:59 - OpenVPN > interactive service msg_channel=0. 2018.03.02 19:13:59 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=9 HWADDR=60:14:b3:b1:87:ed. 2018.03.02 19:13:59 - OpenVPN > open_tun. 2018.03.02 19:13:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5EDA7911-2F90-4386-AAAA-2711818D5B47}.tap. 2018.03.02 19:13:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.03.02 19:13:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.27.156/255.255.0.0 [sUCCEEDED]. 2018.03.02 19:13:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.27.156/255.255.0.0 on interface {5EDA7911-2F90-4386-AAAA-2711818D5B47} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.03.02 19:13:59 - OpenVPN > Successful ARP Flush on interface [8] {5EDA7911-2F90-4386-AAAA-2711818D5B47}. 2018.03.02 19:14:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.03.02 19:14:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.178.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.03.02 19:14:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.03.02 19:14:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.03.02 19:14:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.03.02 19:14:04 - DNS leak protection with packet filtering enabled.. 2018.03.02 19:14:04 - Flushing DNSI 2018.03.02 19:14:07 - Checking routeI 2018.03.02 19:14:08 - Checking DNS! 2018.03.02 19:14:21 - Connected.. 2018.03.02 19:14:21 - OpenVPN > Initialization Sequence Completed ----------------------------Network Interfaces: Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{5EDA7911-2F90-4386-AAAA-2711818D5B47}) - Ethernet - UpNetwork Interface: Ethernet (Realtek PCIe GBE Family Controller, ID:{C96EB02A-22FC-4579-A6EA-0445656CB79B}) - Ethernet - DownNetwork Interface: LAN-verbinding* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2EDD8447-9F82-4D8D-965B-1017F274A274}) - Wireless80211 - DownNetwork Interface: Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC, ID:{61807C10-3111-47E3-91D8-B92EFA709C22}) - Wireless80211 - UpNetwork Interface: Bluetooth-netwerkverbinding (Bluetooth Device (Personal Area Network), ID:{32CD7238-6547-4E41-B402-22B76CAE3A9B}) - Ethernet - DownNetwork Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{52990E96-E066-11E7-B081-806E6F6E6963}) - Loopback - UpNetwork Interface: LAN-verbinding* 11 (Microsoft Teredo Tunneling Adapter, ID:{A60C7BEB-11B2-4C9A-89F9-B37DB175578E}) - Tunnel - Down ----------------------------Default gateways: 192.168.178.1, Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC ----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-AN25KR76 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-5E-DA-79-11 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::cc8c:47c:fc8e:f486%8(Preferred) IPv4 Address. . . . . . . . . . . : 10.4.27.156(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 19:13:59 Lease Expires . . . . . . . . . . : zaterdag 2 maart 2019 19:14:00 Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.4.255.254 DHCPv6 IAID . . . . . . . . . . . : 587267934 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 10.4.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : 54-E1-AD-A3-9C-D9 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter LAN-verbinding* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 62-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC Physical Address. . . . . . . . . : 60-14-B3-B1-87-ED DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::f18e:31bc:2ccf:1841%9(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.178.207(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : vrijdag 2 maart 2018 15:38:11 Lease Expires . . . . . . . . . . : zaterdag 3 maart 2018 19:13:15 Default Gateway . . . . . . . . . : 192.168.178.1 DHCP Server . . . . . . . . . . . : 192.168.178.1 DHCPv6 IAID . . . . . . . . . . . : 157291699 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-79-C8-60-54-E1-AD-A3-9C-D9 DNS Servers . . . . . . . . . . . : 192.168.178.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth-netwerkverbinding: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 60-14-B3-B1-87-EE DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter LAN-verbinding* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes----------------------------route print: ===========================================================================Interface List 8...00 ff 5e da 79 11 ......TAP-Windows Adapter V9 14...54 e1 ad a3 9c d9 ......Realtek PCIe GBE Family Controller 6...62 14 b3 b1 87 ed ......Microsoft Wi-Fi Direct Virtual Adapter 9...60 14 b3 b1 87 ed ......Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC 7...60 14 b3 b1 87 ee ......Bluetooth Device (Personal Area Network) 1...........................Software Loopback Interface 1 13...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter=========================================================================== IPv4 Route Table===========================================================================Active Routes:Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.178.1 192.168.178.207 35 0.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 10.4.0.0 255.255.0.0 On-link 10.4.27.156 259 10.4.27.156 255.255.255.255 On-link 10.4.27.156 259 10.4.255.255 255.255.255.255 On-link 10.4.27.156 259 62.102.148.142 255.255.255.255 192.168.178.1 192.168.178.207 35 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 128.0.0.0 128.0.0.0 10.4.0.1 10.4.27.156 3 192.168.178.0 255.255.255.0 On-link 192.168.178.207 291 192.168.178.207 255.255.255.255 On-link 192.168.178.207 291 192.168.178.255 255.255.255.255 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 192.168.178.207 291 224.0.0.0 240.0.0.0 On-link 10.4.27.156 259 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331 255.255.255.255 255.255.255.255 On-link 192.168.178.207 291 255.255.255.255 255.255.255.255 On-link 10.4.27.156 259===========================================================================Persistent Routes: None IPv6 Route Table===========================================================================Active Routes: If Metric Network Destination Gateway 1 331 ::1/128 On-link 9 291 fe80::/64 On-link 8 259 fe80::/64 On-link 8 259 fe80::cc8c:47c:fc8e:f486/128 On-link 9 291 fe80::f18e:31bc:2ccf:1841/128 On-link 1 331 ff00::/8 On-link 9 291 ff00::/8 On-link 8 259 ff00::/8 On-link===========================================================================Persistent Routes: None Also, I decided to change to a Swedish server, instead of a Dutch server I usually have. Just to see if that makes a difference perhaps.If none of the users here can help you, perhaps you should issue a ticket to staff and include the same logs. Submit a ticket in the "Client Area" if you didn't already know. As well, I see you are running 2.13.6. You could try updating to 2.14 Beta and see if that helps. Thanks again, madrat. I will first update the software. If that doesn't solve the issue and if there are no responses by the end of the weekend, I'll contact the staff directly. Your help is much appreciated! Just curious if this problem was resolved or not? Quote Share this post Link to post
Flx 76 Posted ... See thishttps://airvpn.org/topic/17440-fix-for-tap-adapter-in-windows/ Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post