Jump to content
Not connected, Your IP: 18.212.120.195

Recommended Posts

yo whats up air family me again coming at ya with a issue that just recently sprung up. for some strange reason I'm starting to get Webrtc leaks when i use either google chrome or Mozilla firefox. i wasn't getting them before, but now after tinkering to the best of my ability with Ed boy i still run into the same problem. i even tried the beta software client to see if it would fix it and unfortunately it did not. i do know there are ways to disable certain things on the browser or install add ons to prevent these pesky leaks. however, i'll admit I'm a bit spoiled on not having to worry about doing all of that since the eddie client with the brolic Killswitch would nullify all of that, now i can't really say that anymore. so can anybody help a brotha out????? if you need screenshots or whatever i don't mind providing that if necessary.

Share this post


Link to post

Hello!

 

There's no WebRTC leak if you use Network Lock. But it's possible that if you're using ipleak.net, that you're interpreting the results as being a leak, when they're not.

 

If you go to ipleak.net and scroll to the bottom of the page, there's also instructions on how to disable WebRTC in your browser. You could also install uBlock Origin and set its preferences to do the same thing.

 

Otherwise yes, you will certainly need to supply some proof that you're still leaking when Network Lock is turned on, as that's a baseless claim otherwise, to the say the least .

 

You can also read a number of prior topics on the issue:

 

https://airvpn.org/topic/14306-webrtc-leaks-solved/

 

https://airvpn.org/topic/13519-webrtc-vulnerability/


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

No sir it leaked my location, oddly i don't seem to get them anymore since i had talked about the issue.  of course i know the difference between the local ip address that is given to me by the vpn and the ipv6 address that shows up when i do have a leak. I'll pay attention to this a bit more, in the mean time can anyone tell me what might of happened?????? this is of course with the network lock enabled.

Share this post


Link to post

Could you tell us what Operating System version you're using?

 

Is this address seen in the IP or DNS box, on ipleak.net?

 

Are you running any third-party firewall software? One possible scenario is that you're on Windows with a third-party program interfering with Network Locks firewall settings. Hence we need more details.

 

If you're actually experiencing leaks, then we would really like some logs and/or system reports from you.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

i'm using windows 8.1 and the only virus protection i have is windows defender.  man i wasn't thinking i should've gotten some screenshots, but the leaks were showing in the webrtc leak section.  here is what i have.  i wish i would've saved the logs from when i was having the issue but i wasn't thinking.

 

 

Eddie System/Environment Report - 3/7/2018 1:53 AM UTC

Eddie version: 2.13.6
Eddie OS build: windows_x64
Eddie architecture: x86
OS type: Windows
OS name: Windows 8.1
OS version: Microsoft Windows NT 6.3.9600.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\omni\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\omni\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\AirVPN.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 10.4.0.1, 192.168.1.254
Test DNS IPv4: Ok
Test DNS IPv6: Failed
----------------------------
Test HTTP:

Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Wed, 07 Mar 2018 01:53:28 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.

----------------------------
Test HTTPS:

Status: HTTP/2 200
 - Headers: server:nginx;date:Wed, 07 Mar 2018 01:53:30 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.

----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
advanced.expert: True

----------------------------
Logs:

I 2018.03.06 17:26:25 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 8.1, Version: Microsoft Windows NT 6.3.9600.0, Mono/.Net Framework: v4.0.30319
. 2018.03.06 17:26:25 - Reading options from C:\Users\omni\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.06 17:26:25 - Command line arguments (1): path="home"
I 2018.03.06 17:26:31 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.03.06 17:26:31 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.06 17:26:31 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.06 17:26:31 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.06 17:26:31 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.06 17:26:31 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
. 2018.03.06 17:26:32 - Updating systems & servers data ...
! 2018.03.06 17:26:32 - Ready
. 2018.03.06 17:26:33 - Systems & servers data update completed
! 2018.03.06 17:26:50 - Activation of Network Lock - Windows Filtering Platform
! 2018.03.06 17:26:54 - Deactivation of Network Lock
! 2018.03.06 17:27:34 - Activation of Network Lock - Windows Filtering Platform
I 2018.03.06 17:29:17 - Session starting.
. 2018.03.06 17:29:17 - IPv6 disabled with packet filtering.
I 2018.03.06 17:29:17 - Checking authorization ...
! 2018.03.06 17:29:18 - Connecting to Aludra (Canada, Toronto, Ontario)
. 2018.03.06 17:29:18 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 17:29:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 17:29:18 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 17:29:18 - Connection to OpenVPN Management Interface
. 2018.03.06 17:29:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 17:29:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:29:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:29:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.202:443
. 2018.03.06 17:29:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 17:29:18 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 17:29:18 - OpenVPN > UDP link remote: [AF_INET]104.254.90.202:443
. 2018.03.06 17:29:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 17:29:18 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.202:443, sid=6f2bb3d4 0efb3a08
. 2018.03.06 17:29:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 17:29:18 - OpenVPN > VERIFY KU OK
. 2018.03.06 17:29:18 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 17:29:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 17:29:18 - OpenVPN > VERIFY EKU OK
. 2018.03.06 17:29:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 17:29:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 17:29:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.202:443
. 2018.03.06 17:29:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 17:29:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.134 255.255.0.0'
. 2018.03.06 17:29:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 17:29:20 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 17:29:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 17:29:20 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 17:29:20 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 17:29:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 17:29:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:29:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:29:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:29:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:29:20 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 17:29:20 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 17:29:20 - OpenVPN > open_tun
. 2018.03.06 17:29:20 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 17:29:20 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 17:29:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.134/255.255.0.0 [sUCCEEDED]
. 2018.03.06 17:29:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.134/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 17:29:20 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 17:29:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 17:29:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 17:29:25 - OpenVPN > C:\Windows\system32\route.exe ADD 104.254.90.202 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 17:29:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 17:29:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:29:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:29:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:29:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:29:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:29:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:29:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:29:25 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 17:29:25 - DNS leak protection with packet filtering enabled.
. 2018.03.06 17:29:25 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 17:29:25 - Flushing DNS
I 2018.03.06 17:29:28 - Checking route
I 2018.03.06 17:29:29 - Checking DNS
! 2018.03.06 17:29:42 - Connected.
. 2018.03.06 17:29:42 - OpenVPN > Initialization Sequence Completed
! 2018.03.06 17:29:58 - Disconnecting
. 2018.03.06 17:29:58 - Sending management termination signal
. 2018.03.06 17:29:58 - Management - Send 'signal SIGTERM'
. 2018.03.06 17:30:03 - Connection terminated.
. 2018.03.06 17:30:03 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 17:30:03 - DNS leak protection with packet filtering disabled.
. 2018.03.06 17:30:03 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 17:30:03 - Flushing DNS
. 2018.03.06 17:30:07 - IPv6 restored with packet filtering.
! 2018.03.06 17:30:07 - Session terminated.
I 2018.03.06 17:30:19 - Session starting.
. 2018.03.06 17:30:19 - IPv6 disabled with packet filtering.
I 2018.03.06 17:30:19 - Checking authorization ...
! 2018.03.06 17:30:20 - Connecting to Aludra (Canada, Toronto, Ontario)
. 2018.03.06 17:30:20 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 17:30:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 17:30:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 17:30:20 - Connection to OpenVPN Management Interface
. 2018.03.06 17:30:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 17:30:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:30:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:30:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.202:443
. 2018.03.06 17:30:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 17:30:20 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 17:30:20 - OpenVPN > UDP link remote: [AF_INET]104.254.90.202:443
. 2018.03.06 17:30:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 17:30:20 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.202:443, sid=47faf05b 41628b72
. 2018.03.06 17:30:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 17:30:20 - OpenVPN > VERIFY KU OK
. 2018.03.06 17:30:20 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 17:30:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 17:30:20 - OpenVPN > VERIFY EKU OK
. 2018.03.06 17:30:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 17:30:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 17:30:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.202:443
. 2018.03.06 17:30:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 17:30:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.134 255.255.0.0'
. 2018.03.06 17:30:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 17:30:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 17:30:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 17:30:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 17:30:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 17:30:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 17:30:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:30:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:30:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:30:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:30:22 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 17:30:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 17:30:22 - OpenVPN > open_tun
. 2018.03.06 17:30:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 17:30:22 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 17:30:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.134/255.255.0.0 [sUCCEEDED]
. 2018.03.06 17:30:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.134/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 17:30:22 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 17:30:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 17:30:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 17:30:28 - OpenVPN > C:\Windows\system32\route.exe ADD 104.254.90.202 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 17:30:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 17:30:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:30:28 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:30:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:30:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:30:28 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:30:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:30:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:30:28 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 17:30:28 - DNS leak protection with packet filtering enabled.
. 2018.03.06 17:30:28 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 17:30:28 - Flushing DNS
I 2018.03.06 17:30:31 - Checking route
I 2018.03.06 17:30:32 - Checking DNS
! 2018.03.06 17:30:45 - Connected.
. 2018.03.06 17:30:45 - OpenVPN > Initialization Sequence Completed
! 2018.03.06 17:32:39 - Disconnecting
. 2018.03.06 17:32:39 - Sending management termination signal
. 2018.03.06 17:32:39 - Management - Send 'signal SIGTERM'
. 2018.03.06 17:32:44 - Connection terminated.
. 2018.03.06 17:32:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 17:32:44 - DNS leak protection with packet filtering disabled.
. 2018.03.06 17:32:44 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 17:32:44 - Flushing DNS
. 2018.03.06 17:32:47 - IPv6 restored with packet filtering.
! 2018.03.06 17:32:47 - Session terminated.
I 2018.03.06 17:32:51 - Session starting.
. 2018.03.06 17:32:51 - IPv6 disabled with packet filtering.
I 2018.03.06 17:32:51 - Checking authorization ...
! 2018.03.06 17:32:52 - Connecting to Tegmen (Canada, Toronto, Ontario)
. 2018.03.06 17:32:52 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 17:32:52 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 17:32:52 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 17:32:52 - Connection to OpenVPN Management Interface
. 2018.03.06 17:32:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 17:32:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:32:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:32:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:443
. 2018.03.06 17:32:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 17:32:52 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 17:32:52 - OpenVPN > UDP link remote: [AF_INET]137.63.71.50:443
. 2018.03.06 17:32:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 17:32:54 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=8dda3f3f 7b30dd12
. 2018.03.06 17:32:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 17:32:54 - OpenVPN > VERIFY KU OK
. 2018.03.06 17:32:54 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 17:32:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 17:32:54 - OpenVPN > VERIFY EKU OK
. 2018.03.06 17:32:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org
. 2018.03.06 17:32:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 17:32:55 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.50:443
. 2018.03.06 17:32:56 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 17:32:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.87 255.255.0.0,peer-id 21,cipher AES-256-GCM'
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.06 17:32:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.06 17:32:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.06 17:32:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 17:32:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 17:32:56 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 17:32:56 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 17:32:56 - OpenVPN > open_tun
. 2018.03.06 17:32:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 17:32:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 17:32:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.3.87/255.255.0.0 [sUCCEEDED]
. 2018.03.06 17:32:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.87/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 17:32:56 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 17:32:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 17:33:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 17:33:01 - OpenVPN > C:\Windows\system32\route.exe ADD 137.63.71.50 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 17:33:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 17:33:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:33:01 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:33:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:33:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:33:01 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:33:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:33:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:33:01 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 17:33:01 - DNS leak protection with packet filtering enabled.
. 2018.03.06 17:33:01 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 17:33:01 - Flushing DNS
I 2018.03.06 17:33:05 - Checking route
I 2018.03.06 17:33:05 - Checking DNS
! 2018.03.06 17:33:18 - Connected.
. 2018.03.06 17:33:18 - OpenVPN > Initialization Sequence Completed
. 2018.03.06 17:36:38 - Updating systems & servers data ...
. 2018.03.06 17:36:39 - Systems & servers data update completed
! 2018.03.06 17:42:41 - Disconnecting
. 2018.03.06 17:42:41 - Sending management termination signal
. 2018.03.06 17:42:41 - Management - Send 'signal SIGTERM'
. 2018.03.06 17:42:46 - Connection terminated.
. 2018.03.06 17:42:46 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 17:42:46 - DNS leak protection with packet filtering disabled.
. 2018.03.06 17:42:46 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 17:42:46 - Flushing DNS
. 2018.03.06 17:42:50 - IPv6 restored with packet filtering.
! 2018.03.06 17:42:50 - Session terminated.
I 2018.03.06 17:43:00 - Session starting.
. 2018.03.06 17:43:00 - IPv6 disabled with packet filtering.
I 2018.03.06 17:43:00 - Checking authorization ...
! 2018.03.06 17:43:01 - Connecting to Alkaid (United States, Chicago, Illinois)
. 2018.03.06 17:43:01 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 17:43:01 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 17:43:01 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 17:43:01 - Connection to OpenVPN Management Interface
. 2018.03.06 17:43:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 17:43:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.154.82:443
. 2018.03.06 17:43:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 17:43:01 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 17:43:01 - OpenVPN > UDP link remote: [AF_INET]46.21.154.82:443
. 2018.03.06 17:43:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 17:43:01 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=5095350c 19510b3b
. 2018.03.06 17:43:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 17:43:02 - OpenVPN > VERIFY KU OK
. 2018.03.06 17:43:02 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 17:43:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 17:43:02 - OpenVPN > VERIFY EKU OK
. 2018.03.06 17:43:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 17:43:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 17:43:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443
. 2018.03.06 17:43:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 17:43:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.47 255.255.0.0'
. 2018.03.06 17:43:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 17:43:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 17:43:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 17:43:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 17:43:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 17:43:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 17:43:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:43:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:43:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:04 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 17:43:04 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 17:43:04 - OpenVPN > open_tun
. 2018.03.06 17:43:04 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 17:43:04 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 17:43:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.47/255.255.0.0 [sUCCEEDED]
. 2018.03.06 17:43:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.47/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 17:43:04 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 17:43:04 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 17:43:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 17:43:08 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.154.82 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 17:43:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 17:43:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:43:08 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:43:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:43:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:43:08 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:43:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:43:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:43:08 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 17:43:09 - DNS leak protection with packet filtering enabled.
. 2018.03.06 17:43:09 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 17:43:09 - Flushing DNS
. 2018.03.06 17:43:12 - OpenVPN > Initialization Sequence Completed
! 2018.03.06 17:43:12 - Disconnecting
. 2018.03.06 17:43:12 - Sending management termination signal
. 2018.03.06 17:43:12 - Management - Send 'signal SIGTERM'
. 2018.03.06 17:43:17 - Connection terminated.
. 2018.03.06 17:43:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 17:43:17 - DNS leak protection with packet filtering disabled.
. 2018.03.06 17:43:17 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
I 2018.03.06 17:43:17 - Cancel requested.
. 2018.03.06 17:43:17 - IPv6 restored with packet filtering.
! 2018.03.06 17:43:17 - Session terminated.
I 2018.03.06 17:43:20 - Session starting.
. 2018.03.06 17:43:20 - IPv6 disabled with packet filtering.
I 2018.03.06 17:43:20 - Checking authorization ...
! 2018.03.06 17:43:21 - Connecting to Kraz (Canada, Toronto, Ontario)
. 2018.03.06 17:43:21 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 17:43:21 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 17:43:21 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 17:43:21 - Connection to OpenVPN Management Interface
. 2018.03.06 17:43:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 17:43:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.61:443
. 2018.03.06 17:43:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 17:43:21 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 17:43:21 - OpenVPN > UDP link remote: [AF_INET]199.19.94.61:443
. 2018.03.06 17:43:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 17:43:21 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.61:443, sid=f4c2645a d23ad568
. 2018.03.06 17:43:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 17:43:21 - OpenVPN > VERIFY KU OK
. 2018.03.06 17:43:21 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 17:43:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 17:43:21 - OpenVPN > VERIFY EKU OK
. 2018.03.06 17:43:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 17:43:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 17:43:22 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.61:443
. 2018.03.06 17:43:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 17:43:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.18.89 255.255.0.0,peer-id 83,cipher AES-256-GCM'
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.06 17:43:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.06 17:43:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.06 17:43:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 17:43:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 17:43:23 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 17:43:23 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 17:43:23 - OpenVPN > open_tun
. 2018.03.06 17:43:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 17:43:23 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 17:43:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.18.89/255.255.0.0 [sUCCEEDED]
. 2018.03.06 17:43:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.18.89/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 17:43:23 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 17:43:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
! 2018.03.06 17:43:24 - Disconnecting
. 2018.03.06 17:43:24 - Sending management termination signal
. 2018.03.06 17:43:24 - Management - Send 'signal SIGTERM'
. 2018.03.06 17:43:29 - Connection terminated.
I 2018.03.06 17:43:29 - Cancel requested.
. 2018.03.06 17:43:29 - IPv6 restored with packet filtering.
! 2018.03.06 17:43:29 - Session terminated.
I 2018.03.06 17:43:29 - Session starting.
. 2018.03.06 17:43:29 - IPv6 disabled with packet filtering.
I 2018.03.06 17:43:29 - Checking authorization ...
! 2018.03.06 17:43:30 - Connecting to Alkaid (United States, Chicago, Illinois)
. 2018.03.06 17:43:30 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 17:43:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 17:43:30 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 17:43:30 - Connection to OpenVPN Management Interface
. 2018.03.06 17:43:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 17:43:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.154.82:443
. 2018.03.06 17:43:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 17:43:30 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 17:43:30 - OpenVPN > UDP link remote: [AF_INET]46.21.154.82:443
. 2018.03.06 17:43:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 17:43:30 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=81d25531 9638aebc
. 2018.03.06 17:43:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 17:43:30 - OpenVPN > VERIFY KU OK
. 2018.03.06 17:43:30 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 17:43:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 17:43:30 - OpenVPN > VERIFY EKU OK
. 2018.03.06 17:43:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 17:43:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 17:43:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443
. 2018.03.06 17:43:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 17:43:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.47 255.255.0.0'
. 2018.03.06 17:43:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 17:43:32 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 17:43:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 17:43:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 17:43:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 17:43:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 17:43:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:43:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 17:43:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 17:43:32 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 17:43:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 17:43:32 - OpenVPN > open_tun
. 2018.03.06 17:43:32 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 17:43:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 17:43:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.47/255.255.0.0 [sUCCEEDED]
. 2018.03.06 17:43:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.47/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 17:43:32 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 17:43:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 17:43:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 17:43:37 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.154.82 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 17:43:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 17:43:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:43:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:43:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:43:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:43:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 17:43:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 17:43:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 17:43:37 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 17:43:37 - DNS leak protection with packet filtering enabled.
. 2018.03.06 17:43:37 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 17:43:37 - Flushing DNS
I 2018.03.06 17:43:40 - Checking route
I 2018.03.06 17:43:41 - Checking DNS
! 2018.03.06 17:43:53 - Connected.
. 2018.03.06 17:43:54 - OpenVPN > Initialization Sequence Completed
. 2018.03.06 17:46:43 - Updating systems & servers data ...
. 2018.03.06 17:46:44 - Systems & servers data update completed
. 2018.03.06 17:56:48 - Updating systems & servers data ...
. 2018.03.06 17:56:49 - Systems & servers data update completed
. 2018.03.06 18:06:54 - Updating systems & servers data ...
. 2018.03.06 18:06:56 - Systems & servers data update completed
. 2018.03.06 18:17:02 - Updating systems & servers data ...
. 2018.03.06 18:17:03 - Systems & servers data update completed
. 2018.03.06 18:27:11 - Updating systems & servers data ...
. 2018.03.06 18:27:12 - Systems & servers data update completed
. 2018.03.06 18:37:16 - Updating systems & servers data ...
. 2018.03.06 18:37:17 - Systems & servers data update completed
. 2018.03.06 18:43:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 18:43:31 - OpenVPN > VERIFY KU OK
. 2018.03.06 18:43:31 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 18:43:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 18:43:31 - OpenVPN > VERIFY EKU OK
. 2018.03.06 18:43:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 18:43:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 18:43:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 18:43:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 18:43:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 18:43:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 18:47:22 - Updating systems & servers data ...
. 2018.03.06 18:47:23 - Systems & servers data update completed
. 2018.03.06 18:57:28 - Updating systems & servers data ...
. 2018.03.06 18:57:29 - Systems & servers data update completed
! 2018.03.06 19:06:21 - Disconnecting
. 2018.03.06 19:06:21 - Sending management termination signal
. 2018.03.06 19:06:21 - Management - Send 'signal SIGTERM'
. 2018.03.06 19:06:26 - Connection terminated.
. 2018.03.06 19:06:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 19:06:26 - DNS leak protection with packet filtering disabled.
. 2018.03.06 19:06:26 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 19:06:26 - Flushing DNS
. 2018.03.06 19:06:30 - IPv6 restored with packet filtering.
! 2018.03.06 19:06:30 - Session terminated.
I 2018.03.06 19:06:57 - Session starting.
. 2018.03.06 19:06:57 - IPv6 disabled with packet filtering.
I 2018.03.06 19:06:57 - Checking authorization ...
! 2018.03.06 19:06:58 - Connecting to Sagittarius (United States, Atlanta, Georgia)
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:58 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:58 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:58 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:58 LOG5[ui]: Reading configuration from file C:\Users\omni\AppData\Local\AirVPN\348611f862ec63b2a013d45007f34ccb124fa6f78896b3a86b35f0a7b1df9972.tmp.ssl
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:58 LOG5[ui]: UTF-8 byte order mark not detected
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:58 LOG6[ui]: Initializing service [openvpn]
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG5[ui]: Configuration successful
. 2018.03.06 19:06:59 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 19:06:59 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 19:06:59 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 19:06:59 - Connection to OpenVPN Management Interface
. 2018.03.06 19:06:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 19:06:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:06:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:06:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:28959
. 2018.03.06 19:06:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 19:06:59 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:28959 [nonblock]
. 2018.03.06 19:06:59 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:28959
. 2018.03.06 19:06:59 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.06 19:06:59 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:28959
. 2018.03.06 19:06:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:55369
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG6[0]: s_connect: connecting 108.177.134.74:28439
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG5[0]: s_connect: connected 108.177.134.74:28439
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.159:55370
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG6[0]: SNI: sending servername: 108.177.134.74
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG6[0]: Peer certificate not required
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG6[0]: Certificate verification disabled
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG6[0]: Client certificate not requested
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG6[0]: TLS connected: new session negotiated
. 2018.03.06 19:06:59 - SSL > 2018.03.06 19:06:59 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2018.03.06 19:06:59 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:28959, sid=741fb6e7 905e5dfc
. 2018.03.06 19:06:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 19:06:59 - OpenVPN > VERIFY KU OK
. 2018.03.06 19:06:59 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 19:06:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 19:06:59 - OpenVPN > VERIFY EKU OK
. 2018.03.06 19:06:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sagittarius, emailAddress=info@airvpn.org
. 2018.03.06 19:07:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 19:07:00 - OpenVPN > [sagittarius] Peer Connection Initiated with [AF_INET]127.0.0.1:28959
. 2018.03.06 19:07:01 - OpenVPN > SENT CONTROL [sagittarius]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 19:07:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.102 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.03.06 19:07:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.06 19:07:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.06 19:07:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 19:07:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 19:07:01 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 19:07:01 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 19:07:01 - OpenVPN > open_tun
. 2018.03.06 19:07:01 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 19:07:01 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 19:07:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.102/255.255.0.0 [sUCCEEDED]
. 2018.03.06 19:07:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.102/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2018.03.06 19:07:01 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 19:07:01 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 19:07:06 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2018.03.06 19:07:06 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 19:07:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 19:07:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:07:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.06 19:07:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:07:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:07:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.06 19:07:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:07:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:07:06 - OpenVPN > C:\Windows\system32\route.exe ADD 108.177.134.74 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 19:07:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 19:07:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:07:06 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 19:07:06 - DNS leak protection with packet filtering enabled.
. 2018.03.06 19:07:06 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)
. 2018.03.06 19:07:06 - Flushing DNS
I 2018.03.06 19:07:10 - Checking route
I 2018.03.06 19:07:10 - Checking DNS
! 2018.03.06 19:07:23 - Connected.
. 2018.03.06 19:07:23 - OpenVPN > Initialization Sequence Completed
. 2018.03.06 19:07:33 - Updating systems & servers data ...
. 2018.03.06 19:07:34 - Systems & servers data update completed
. 2018.03.06 19:07:58 - SSL > 2018.03.06 19:07:58 LOG6[cron]: Executing cron jobs
. 2018.03.06 19:07:58 - SSL > 2018.03.06 19:07:58 LOG6[cron]: Cron jobs completed in 0 seconds
! 2018.03.06 19:08:05 - Disconnecting
. 2018.03.06 19:08:05 - Sending management termination signal
. 2018.03.06 19:08:05 - Management - Send 'signal SIGTERM'
. 2018.03.06 19:08:15 - Sending soft termination signal
. 2018.03.06 19:08:15 - Connection terminated.
. 2018.03.06 19:08:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 19:08:15 - DNS leak protection with packet filtering disabled.
. 2018.03.06 19:08:15 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 19:08:15 - Flushing DNS
. 2018.03.06 19:08:18 - IPv6 restored with packet filtering.
! 2018.03.06 19:08:18 - Session terminated.
I 2018.03.06 19:08:28 - Session starting.
. 2018.03.06 19:08:28 - IPv6 disabled with packet filtering.
I 2018.03.06 19:08:28 - Checking authorization ...
! 2018.03.06 19:08:29 - Connecting to Microscopium (United States, Chicago, Illinois)
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[ui]: Reading configuration from file C:\Users\omni\AppData\Local\AirVPN\8d2e8260a8bb0c81d748f0f1ed5a226ffd4bb8dfd8223530150854d27c247986.tmp.ssl
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[ui]: UTF-8 byte order mark not detected
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[ui]: Initializing service [openvpn]
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[ui]: Configuration successful
. 2018.03.06 19:08:29 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 19:08:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 19:08:29 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 19:08:29 - Connection to OpenVPN Management Interface
. 2018.03.06 19:08:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 19:08:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:08:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:08:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:57995
. 2018.03.06 19:08:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 19:08:29 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:57995 [nonblock]
. 2018.03.06 19:08:29 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:57995
. 2018.03.06 19:08:29 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.06 19:08:29 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:57995
. 2018.03.06 19:08:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:55584
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[0]: s_connect: connecting 23.227.202.114:28439
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[0]: s_connect: connected 23.227.202.114:28439
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.159:55585
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[0]: SNI: sending servername: 23.227.202.114
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[0]: Peer certificate not required
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[0]: Certificate verification disabled
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[0]: Client certificate not requested
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[0]: TLS connected: new session negotiated
. 2018.03.06 19:08:29 - SSL > 2018.03.06 19:08:29 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2018.03.06 19:08:30 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:57995, sid=a9f7c3bb 0dc3d04b
. 2018.03.06 19:08:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 19:08:30 - OpenVPN > VERIFY KU OK
. 2018.03.06 19:08:30 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 19:08:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 19:08:30 - OpenVPN > VERIFY EKU OK
. 2018.03.06 19:08:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Microscopium, emailAddress=info@airvpn.org
. 2018.03.06 19:08:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 19:08:30 - OpenVPN > [Microscopium] Peer Connection Initiated with [AF_INET]127.0.0.1:57995
. 2018.03.06 19:08:31 - OpenVPN > SENT CONTROL [Microscopium]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 19:08:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.45 255.255.0.0,peer-id 0,cipher AES-256-GCM'
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2018.03.06 19:08:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.06 19:08:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.06 19:08:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 19:08:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 19:08:31 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 19:08:31 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 19:08:31 - OpenVPN > open_tun
. 2018.03.06 19:08:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 19:08:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 19:08:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.45/255.255.0.0 [sUCCEEDED]
. 2018.03.06 19:08:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.45/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2018.03.06 19:08:31 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 19:08:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 19:08:37 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2018.03.06 19:08:37 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 19:08:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 19:08:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:08:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.06 19:08:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:08:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:08:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2018.03.06 19:08:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:08:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:08:37 - OpenVPN > C:\Windows\system32\route.exe ADD 23.227.202.114 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 19:08:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 19:08:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:08:37 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 19:08:37 - DNS leak protection with packet filtering enabled.
. 2018.03.06 19:08:37 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)
. 2018.03.06 19:08:37 - Flushing DNS
I 2018.03.06 19:08:40 - Checking route
I 2018.03.06 19:08:41 - Checking DNS
! 2018.03.06 19:08:53 - Connected.
. 2018.03.06 19:08:53 - OpenVPN > Initialization Sequence Completed
! 2018.03.06 19:09:26 - Disconnecting
. 2018.03.06 19:09:26 - Sending management termination signal
. 2018.03.06 19:09:26 - Management - Send 'signal SIGTERM'
. 2018.03.06 19:09:36 - Sending soft termination signal
. 2018.03.06 19:09:36 - Connection terminated.
. 2018.03.06 19:09:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 19:09:36 - DNS leak protection with packet filtering disabled.
. 2018.03.06 19:09:36 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 19:09:36 - Flushing DNS
. 2018.03.06 19:09:39 - IPv6 restored with packet filtering.
! 2018.03.06 19:09:39 - Session terminated.
! 2018.03.06 19:09:47 - Deactivation of Network Lock
! 2018.03.06 19:13:16 - Activation of Network Lock - Windows Filtering Platform
I 2018.03.06 19:13:34 - Session starting.
. 2018.03.06 19:13:34 - IPv6 disabled with packet filtering.
I 2018.03.06 19:13:34 - Checking authorization ...
! 2018.03.06 19:13:35 - Connecting to Aludra (Canada, Toronto, Ontario)
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG5[ui]: Reading configuration from file C:\Users\omni\AppData\Local\AirVPN\6a38c20970ddf6dedb575dafb17a8744f662747813fc38dbfbc1e47ce22a3a3f.tmp.ssl
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG5[ui]: UTF-8 byte order mark not detected
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG6[ui]: Initializing service [openvpn]
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG5[ui]: Configuration successful
. 2018.03.06 19:13:35 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 19:13:35 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 19:13:35 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 19:13:35 - Connection to OpenVPN Management Interface
. 2018.03.06 19:13:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 19:13:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:14357
. 2018.03.06 19:13:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 19:13:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:14357 [nonblock]
. 2018.03.06 19:13:35 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:14357
. 2018.03.06 19:13:35 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2018.03.06 19:13:35 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:14357
. 2018.03.06 19:13:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:55761
. 2018.03.06 19:13:35 - SSL > 2018.03.06 19:13:35 LOG6[0]: s_connect: connecting 104.254.90.202:28439
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:35 LOG5[0]: s_connect: connected 104.254.90.202:28439
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:35 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.159:55762
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:35 LOG6[0]: SNI: sending servername: 104.254.90.202
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:35 LOG6[0]: Peer certificate not required
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:36 LOG6[0]: Certificate verification disabled
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:36 LOG6[0]: Client certificate not requested
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:36 LOG6[0]: TLS connected: new session negotiated
. 2018.03.06 19:13:36 - SSL > 2018.03.06 19:13:36 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2018.03.06 19:13:36 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:14357, sid=cce8e533 4d90f15e
. 2018.03.06 19:13:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 19:13:36 - OpenVPN > VERIFY KU OK
. 2018.03.06 19:13:36 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 19:13:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 19:13:36 - OpenVPN > VERIFY EKU OK
. 2018.03.06 19:13:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 19:13:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 19:13:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:14357
. 2018.03.06 19:13:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 19:13:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.163 255.255.0.0'
. 2018.03.06 19:13:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 19:13:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 19:13:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 19:13:38 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 19:13:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 19:13:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 19:13:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 19:13:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 19:13:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:38 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 19:13:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 19:13:38 - OpenVPN > open_tun
. 2018.03.06 19:13:38 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 19:13:38 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 19:13:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.163/255.255.0.0 [sUCCEEDED]
. 2018.03.06 19:13:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.163/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2018.03.06 19:13:38 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 19:13:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
! 2018.03.06 19:13:39 - Disconnecting
. 2018.03.06 19:13:39 - Sending management termination signal
. 2018.03.06 19:13:39 - Management - Send 'signal SIGTERM'
. 2018.03.06 19:13:49 - Sending soft termination signal
. 2018.03.06 19:13:49 - Connection terminated.
I 2018.03.06 19:13:49 - Cancel requested.
. 2018.03.06 19:13:49 - IPv6 restored with packet filtering.
! 2018.03.06 19:13:49 - Session terminated.
I 2018.03.06 19:13:52 - Session starting.
. 2018.03.06 19:13:53 - IPv6 disabled with packet filtering.
I 2018.03.06 19:13:53 - Checking authorization ...
! 2018.03.06 19:13:53 - Connecting to Aludra (Canada, Toronto, Ontario)
. 2018.03.06 19:13:53 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 19:13:53 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 19:13:53 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 19:13:53 - Connection to OpenVPN Management Interface
. 2018.03.06 19:13:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 19:13:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.204:443
. 2018.03.06 19:13:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 19:13:53 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 19:13:53 - OpenVPN > UDP link remote: [AF_INET]104.254.90.204:443
. 2018.03.06 19:13:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 19:13:54 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.204:443, sid=b4b3eef4 fb08624b
. 2018.03.06 19:13:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 19:13:54 - OpenVPN > VERIFY KU OK
. 2018.03.06 19:13:54 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 19:13:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 19:13:54 - OpenVPN > VERIFY EKU OK
. 2018.03.06 19:13:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 19:13:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 19:13:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.204:443
. 2018.03.06 19:13:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 19:13:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.134 255.255.0.0'
. 2018.03.06 19:13:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 19:13:55 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 19:13:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 19:13:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 19:13:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 19:13:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 19:13:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 19:13:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 19:13:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:13:55 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 19:13:55 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 19:13:56 - OpenVPN > open_tun
. 2018.03.06 19:13:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 19:13:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 19:13:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.134/255.255.0.0 [sUCCEEDED]
. 2018.03.06 19:13:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.134/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 19:13:56 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 19:13:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 19:14:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 19:14:00 - OpenVPN > C:\Windows\system32\route.exe ADD 104.254.90.204 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 19:14:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 19:14:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:14:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 19:14:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:14:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:14:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 19:14:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:14:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:14:00 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 19:14:00 - DNS leak protection with packet filtering enabled.
. 2018.03.06 19:14:00 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 19:14:00 - Flushing DNS
I 2018.03.06 19:14:03 - Checking route
I 2018.03.06 19:14:06 - Checking DNS
! 2018.03.06 19:14:18 - Connected.
. 2018.03.06 19:14:18 - OpenVPN > Initialization Sequence Completed
. 2018.03.06 19:17:39 - Updating systems & servers data ...
. 2018.03.06 19:17:42 - Systems & servers data update completed
. 2018.03.06 19:27:51 - Updating systems & servers data ...
. 2018.03.06 19:27:53 - Systems & servers data update completed
! 2018.03.06 19:36:26 - Disconnecting
. 2018.03.06 19:36:26 - Sending management termination signal
. 2018.03.06 19:36:26 - Management - Send 'signal SIGTERM'
. 2018.03.06 19:36:31 - Connection terminated.
. 2018.03.06 19:36:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 19:36:31 - DNS leak protection with packet filtering disabled.
. 2018.03.06 19:36:31 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 19:36:31 - Flushing DNS
. 2018.03.06 19:36:35 - IPv6 restored with packet filtering.
! 2018.03.06 19:36:35 - Session terminated.
I 2018.03.06 19:36:37 - Session starting.
. 2018.03.06 19:36:37 - IPv6 disabled with packet filtering.
I 2018.03.06 19:36:38 - Checking authorization ...
! 2018.03.06 19:36:38 - Connecting to Cephei (Canada, Toronto, Ontario)
. 2018.03.06 19:36:38 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 19:36:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 19:36:38 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 19:36:38 - Connection to OpenVPN Management Interface
. 2018.03.06 19:36:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 19:36:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:36:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:36:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443
. 2018.03.06 19:36:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 19:36:38 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 19:36:38 - OpenVPN > UDP link remote: [AF_INET]184.75.214.162:443
. 2018.03.06 19:36:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 19:36:38 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=d769ead3 e1bbdc2f
. 2018.03.06 19:36:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 19:36:38 - OpenVPN > VERIFY KU OK
. 2018.03.06 19:36:38 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 19:36:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 19:36:38 - OpenVPN > VERIFY EKU OK
. 2018.03.06 19:36:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.06 19:36:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 19:36:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443
. 2018.03.06 19:36:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 19:36:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.122.131 255.255.0.0'
. 2018.03.06 19:36:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 19:36:40 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 19:36:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 19:36:40 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 19:36:40 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 19:36:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 19:36:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 19:36:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:36:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.06 19:36:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:36:40 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 19:36:40 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 19:36:40 - OpenVPN > open_tun
. 2018.03.06 19:36:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 19:36:41 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 19:36:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.122.131/255.255.0.0 [sUCCEEDED]
. 2018.03.06 19:36:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.122.131/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 19:36:41 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 19:36:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 19:36:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 19:36:45 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.214.162 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 19:36:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 19:36:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:36:45 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 19:36:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:36:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:36:45 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 19:36:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:36:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:36:45 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 19:36:45 - DNS leak protection with packet filtering enabled.
. 2018.03.06 19:36:45 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 19:36:45 - Flushing DNS
I 2018.03.06 19:36:49 - Checking route
I 2018.03.06 19:36:49 - Checking DNS
! 2018.03.06 19:37:02 - Connected.
. 2018.03.06 19:37:02 - OpenVPN > Initialization Sequence Completed
. 2018.03.06 19:37:59 - Updating systems & servers data ...
. 2018.03.06 19:38:03 - Systems & servers data update completed
! 2018.03.06 19:39:37 - Disconnecting
. 2018.03.06 19:39:37 - Sending management termination signal
. 2018.03.06 19:39:37 - Management - Send 'signal SIGTERM'
. 2018.03.06 19:39:42 - Connection terminated.
. 2018.03.06 19:39:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.03.06 19:39:42 - DNS leak protection with packet filtering disabled.
. 2018.03.06 19:39:42 - Interface Ethernet 2 metric restored from 3 to 6, layer IPv4
. 2018.03.06 19:39:42 - Flushing DNS
. 2018.03.06 19:39:45 - IPv6 restored with packet filtering.
! 2018.03.06 19:39:45 - Session terminated.
I 2018.03.06 19:40:04 - Session starting.
. 2018.03.06 19:40:04 - IPv6 disabled with packet filtering.
I 2018.03.06 19:40:04 - Checking authorization ...
! 2018.03.06 19:40:05 - Connecting to Microscopium (United States, Chicago, Illinois)
. 2018.03.06 19:40:05 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.06 19:40:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.06 19:40:05 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.06 19:40:05 - Connection to OpenVPN Management Interface
. 2018.03.06 19:40:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.06 19:40:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:40:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.06 19:40:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.227.202.114:443
. 2018.03.06 19:40:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.06 19:40:05 - OpenVPN > UDP link local: (not bound)
. 2018.03.06 19:40:05 - OpenVPN > UDP link remote: [AF_INET]23.227.202.114:443
. 2018.03.06 19:40:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.06 19:40:05 - OpenVPN > TLS: Initial packet from [AF_INET]23.227.202.114:443, sid=21bda719 9839b0d7
. 2018.03.06 19:40:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 19:40:05 - OpenVPN > VERIFY KU OK
. 2018.03.06 19:40:05 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 19:40:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 19:40:05 - OpenVPN > VERIFY EKU OK
. 2018.03.06 19:40:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Microscopium, emailAddress=info@airvpn.org
. 2018.03.06 19:40:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 19:40:05 - OpenVPN > [Microscopium] Peer Connection Initiated with [AF_INET]23.227.202.114:443
. 2018.03.06 19:40:06 - OpenVPN > SENT CONTROL [Microscopium]: 'PUSH_REQUEST' (status=1)
. 2018.03.06 19:40:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.19 255.255.0.0,peer-id 32,cipher AES-256-GCM'
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.06 19:40:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.06 19:40:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.06 19:40:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 19:40:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 19:40:06 - OpenVPN > interactive service msg_channel=0
. 2018.03.06 19:40:06 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=3 HWADDR=6c:c2:17:74:1f:20
. 2018.03.06 19:40:06 - OpenVPN > open_tun
. 2018.03.06 19:40:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{1065C77D-C870-440C-BA46-28FA8A7C87AF}.tap
. 2018.03.06 19:40:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.06 19:40:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.1.19/255.255.0.0 [sUCCEEDED]
. 2018.03.06 19:40:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.19/255.255.0.0 on interface {1065C77D-C870-440C-BA46-28FA8A7C87AF} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.06 19:40:07 - OpenVPN > Successful ARP Flush on interface [29] {1065C77D-C870-440C-BA46-28FA8A7C87AF}
. 2018.03.06 19:40:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.06 19:40:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.06 19:40:11 - OpenVPN > C:\Windows\system32\route.exe ADD 23.227.202.114 MASK 255.255.255.255 192.168.1.254
. 2018.03.06 19:40:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.03.06 19:40:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:40:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 19:40:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:40:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:40:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.03.06 19:40:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2018.03.06 19:40:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.06 19:40:11 - Interface Ethernet 2 metric changed from 6 to 3, layer IPv4
. 2018.03.06 19:40:11 - DNS leak protection with packet filtering enabled.
. 2018.03.06 19:40:11 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.03.06 19:40:11 - Flushing DNS
I 2018.03.06 19:40:15 - Checking route
I 2018.03.06 19:40:15 - Checking DNS
! 2018.03.06 19:40:28 - Connected.
. 2018.03.06 19:40:28 - OpenVPN > Initialization Sequence Completed
. 2018.03.06 19:48:07 - Updating systems & servers data ...
. 2018.03.06 19:48:08 - Systems & servers data update completed
. 2018.03.06 19:58:12 - Updating systems & servers data ...
. 2018.03.06 19:58:13 - Systems & servers data update completed
. 2018.03.06 20:08:18 - Updating systems & servers data ...
. 2018.03.06 20:08:20 - Systems & servers data update completed
. 2018.03.06 20:18:26 - Updating systems & servers data ...
. 2018.03.06 20:18:27 - Systems & servers data update completed
. 2018.03.06 20:28:32 - Updating systems & servers data ...
. 2018.03.06 20:28:33 - Systems & servers data update completed
. 2018.03.06 20:38:38 - Updating systems & servers data ...
. 2018.03.06 20:38:39 - Systems & servers data update completed
. 2018.03.06 20:40:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.06 20:40:05 - OpenVPN > VERIFY KU OK
. 2018.03.06 20:40:05 - OpenVPN > Validating certificate extended key usage
. 2018.03.06 20:40:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.06 20:40:05 - OpenVPN > VERIFY EKU OK
. 2018.03.06 20:40:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Microscopium, emailAddress=info@airvpn.org
. 2018.03.06 20:40:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 20:40:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.06 20:40:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.06 20:48:43 - Updating systems & servers data ...
. 2018.03.06 20:48:45 - Systems & servers data update completed

----------------------------
Network Interfaces:

Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{1065C77D-C870-440C-BA46-28FA8A7C87AF}) - Ethernet - Up
Network Interface: Ethernet 3 (ASIX AX88179 USB 3.0 to Gigabit Ethernet Adapter, ID:{BBF99DE5-EAB3-4EC2-92B4-FAF87C7633EB}) - Ethernet - Up
Network Interface: Ethernet (Realtek PCIe FE Family Controller, ID:{292DF2FA-7F94-4001-97A6-04156F927CC4}) - Ethernet - Up
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{BBED3E08-0B41-11E3-8249-806E6F6E6963}) - Loopback - Up

----------------------------
Default gateways:

192.168.1.254, Realtek PCIe FE Family Controller

----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : omnipotent93
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : attlocal.net

Ethernet adapter Ethernet 2:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-10-65-C7-7D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 10.4.1.19(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : Tuesday, March 6, 2018 7:40:06 PM
   Lease Expires . . . . . . . . . . : Wednesday, March 6, 2019 7:40:12 PM
   Default Gateway . . . . . . . . . :
   DHCP Server . . . . . . . . . . . : 10.4.255.254
   DNS Servers . . . . . . . . . . . : 10.4.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Ethernet 3:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : ASIX AX88179 USB 3.0 to Gigabit Ethernet Adapter
   Physical Address. . . . . . . . . : 00-05-1B-B1-51-A8
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.137.1(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . :
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . : attlocal.net
   Description . . . . . . . . . . . : Realtek PCIe FE Family Controller
   Physical Address. . . . . . . . . : 6C-C2-17-74-1F-20
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.1.159(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Monday, March 5, 2018 5:47:42 PM
   Lease Expires . . . . . . . . . . : Wednesday, March 7, 2018 7:27:15 PM
   Default Gateway . . . . . . . . . : 192.168.1.254
   DHCP Server . . . . . . . . . . . : 192.168.1.254
   DNS Servers . . . . . . . . . . . : 192.168.1.254
   NetBIOS over Tcpip. . . . . . . . : Enabled
----------------------------
route print:

===========================================================================
Interface List
 29...00 ff 10 65 c7 7d ......TAP-Windows Adapter V9
 27...00 05 1b b1 51 a8 ......ASIX AX88179 USB 3.0 to Gigabit Ethernet Adapter
  3...6c c2 17 74 1f 20 ......Realtek PCIe FE Family Controller
  1...........................Software Loopback Interface 1
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.1.254    192.168.1.159     20
          0.0.0.0        128.0.0.0         10.4.0.1        10.4.1.19      3
         10.4.0.0      255.255.0.0         On-link         10.4.1.19    259
        10.4.1.19  255.255.255.255         On-link         10.4.1.19    259
     10.4.255.255  255.255.255.255         On-link         10.4.1.19    259
   23.227.202.114  255.255.255.255    192.168.1.254    192.168.1.159     20
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
        128.0.0.0        128.0.0.0         10.4.0.1        10.4.1.19      3
      192.168.1.0    255.255.255.0         On-link     192.168.1.159    276
    192.168.1.159  255.255.255.255         On-link     192.168.1.159    276
    192.168.1.255  255.255.255.255         On-link     192.168.1.159    276
    192.168.137.0    255.255.255.0         On-link     192.168.137.1    266
    192.168.137.1  255.255.255.255         On-link     192.168.137.1    266
  192.168.137.255  255.255.255.255         On-link     192.168.137.1    266
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link     192.168.137.1    266
        224.0.0.0        240.0.0.0         On-link     192.168.1.159    276
        224.0.0.0        240.0.0.0         On-link         10.4.1.19    259
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link     192.168.137.1    266
  255.255.255.255  255.255.255.255         On-link     192.168.1.159    276
  255.255.255.255  255.255.255.255         On-link         10.4.1.19    259
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    306 ::1/128                  On-link
  1    306 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

Share this post


Link to post

Hello,

 

it is not possible to have WebRTC (or any other application binding to the physical network interface) working with Network Lock enabled, unless you modify the firewall rules after you have enabled Network Lock. Maybe you might be confusing the matter with the HTML5 geo-location (if so, just disable HTML5 geo-location feature in your browser).

 

HTML5 geo-location is not a leak out of the tunnel, since your browser sends out your location to the final service in the http stream inside the tunnel. It's a problem in your system, completely out of the scope of our service (and rightly so, because our service will never inspect your packets, even if that was possible in absence of end-to-end encryption).

 

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...