Jump to content
Not connected, Your IP: 3.235.251.99
Rowdanth

route gateway is not reachable on any active network adapters 10.4.0.1

Recommended Posts

Airvpn used to work fine but as of ~1-2 months ago, kept receiving the following error

 

Route gateway is not reachable on any active network adapters 

 

Have tried resetting protocols through command prompt, disabling, and re enabling devices, and network reset through settings, nothing worked. Have gone through several forum posts, and tried the described solutions to no avail. 

 

 

System: Win 10 Basic

 

Specs:

nVidiaGTX 1060(mobile)

intel i7 7700HQ

Killer Wireless-n/a/ac 1535 Wireless Network Adapter

 

Computer is MSi GF62VR

 

 

Logs:

I 2018.03.09 03:45:40 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.03.09 03:45:40 - Reading options from C:\Users\Hansa\AppData\Local\AirVPN\AirVPN.xml
. 2018.03.09 03:45:40 - Command line arguments (1): path="home"
I 2018.03.09 03:45:45 - OpenVPN Driver - TAP-Windows Adapter V9 #2, version 9.21.2
I 2018.03.09 03:45:45 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.03.09 03:45:45 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.03.09 03:45:45 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.03.09 03:45:45 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.03.09 03:45:45 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
! 2018.03.09 03:45:46 - Activation of Network Lock - Windows Filtering Platform
. 2018.03.09 03:45:46 - Updating systems & servers data ...
! 2018.03.09 03:45:46 - Ready
. 2018.03.09 03:45:47 - Systems & servers data update completed
I 2018.03.09 03:46:00 - Session starting.
. 2018.03.09 03:46:00 - IPv6 disabled with packet filtering.
I 2018.03.09 03:46:00 - Checking authorization ...
! 2018.03.09 03:46:00 - Connecting to Pavonis (United States, Chicago, Illinois)
. 2018.03.09 03:46:01 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.09 03:46:01 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.09 03:46:01 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.09 03:46:01 - Connection to OpenVPN Management Interface
. 2018.03.09 03:46:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.09 03:46:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]149.255.33.154:443
. 2018.03.09 03:46:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.09 03:46:01 - OpenVPN > UDP link local: (not bound)
. 2018.03.09 03:46:01 - OpenVPN > UDP link remote: [AF_INET]149.255.33.154:443
. 2018.03.09 03:46:01 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=8b533037 04b16809
. 2018.03.09 03:46:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.09 03:46:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.09 03:46:01 - OpenVPN > VERIFY KU OK
. 2018.03.09 03:46:01 - OpenVPN > Validating certificate extended key usage
. 2018.03.09 03:46:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.09 03:46:01 - OpenVPN > VERIFY EKU OK
. 2018.03.09 03:46:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.09 03:46:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.09 03:46:01 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443
. 2018.03.09 03:46:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.09 03:46:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.17.187 255.255.0.0'
. 2018.03.09 03:46:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.09 03:46:02 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.09 03:46:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.09 03:46:02 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.09 03:46:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.09 03:46:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.09 03:46:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.09 03:46:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.09 03:46:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:02 - OpenVPN > interactive service msg_channel=0
. 2018.03.09 03:46:02 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=9c:b6:d0:69:62:c5
. 2018.03.09 03:46:02 - OpenVPN > open_tun
. 2018.03.09 03:46:02 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{54E4978D-83FE-40FC-84CA-81CB88A9B9A1}.tap
. 2018.03.09 03:46:02 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.09 03:46:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.17.187/255.255.0.0 [sUCCEEDED]
. 2018.03.09 03:46:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.17.187/255.255.0.0 on interface {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.09 03:46:02 - OpenVPN > NOTE: FlushIpNetTable failed on interface [5] {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} (status=1168) : Element not found.
. 2018.03.09 03:46:02 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.09 03:46:07 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:07 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:07 - Eddie Windows Interface Hack executed (Ethernet 3)
! 2018.03.09 03:46:10 - Disconnecting
. 2018.03.09 03:46:10 - Sending management termination signal
. 2018.03.09 03:46:10 - Management - Send 'signal SIGTERM'
. 2018.03.09 03:46:15 - Connection terminated.
I 2018.03.09 03:46:15 - Cancel requested.
. 2018.03.09 03:46:15 - IPv6 restored with packet filtering.
! 2018.03.09 03:46:15 - Session terminated.
I 2018.03.09 03:46:17 - Session starting.
. 2018.03.09 03:46:17 - IPv6 disabled with packet filtering.
I 2018.03.09 03:46:17 - Checking authorization ...
! 2018.03.09 03:46:18 - Connecting to Regulus (Canada, Toronto, Ontario)
. 2018.03.09 03:46:18 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.09 03:46:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.09 03:46:18 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.09 03:46:18 - Connection to OpenVPN Management Interface
. 2018.03.09 03:46:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.09 03:46:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.34:443
. 2018.03.09 03:46:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.09 03:46:19 - OpenVPN > UDP link local: (not bound)
. 2018.03.09 03:46:19 - OpenVPN > UDP link remote: [AF_INET]184.75.221.34:443
. 2018.03.09 03:46:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.09 03:46:19 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.34:443, sid=d15c09b3 48deb053
. 2018.03.09 03:46:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.09 03:46:19 - OpenVPN > VERIFY KU OK
. 2018.03.09 03:46:19 - OpenVPN > Validating certificate extended key usage
. 2018.03.09 03:46:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.09 03:46:19 - OpenVPN > VERIFY EKU OK
. 2018.03.09 03:46:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.09 03:46:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.09 03:46:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.34:443
. 2018.03.09 03:46:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.09 03:46:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.230 255.255.0.0'
. 2018.03.09 03:46:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.09 03:46:21 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.09 03:46:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.09 03:46:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.09 03:46:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.09 03:46:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.09 03:46:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.09 03:46:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.03.09 03:46:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:46:21 - OpenVPN > interactive service msg_channel=0
. 2018.03.09 03:46:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=9c:b6:d0:69:62:c5
. 2018.03.09 03:46:21 - OpenVPN > open_tun
. 2018.03.09 03:46:21 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{54E4978D-83FE-40FC-84CA-81CB88A9B9A1}.tap
. 2018.03.09 03:46:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.09 03:46:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.5.230/255.255.0.0 [sUCCEEDED]
. 2018.03.09 03:46:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.5.230/255.255.0.0 on interface {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.09 03:46:21 - OpenVPN > NOTE: FlushIpNetTable failed on interface [5] {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} (status=1168) : Element not found.
. 2018.03.09 03:46:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.09 03:46:26 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:26 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:31 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:31 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:32 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:32 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:32 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:33 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:33 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:34 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:34 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:35 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:35 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:35 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:36 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:36 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:36 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:37 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:37 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:38 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:38 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:38 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:39 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:39 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:40 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:40 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:41 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:41 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:42 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:42 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:44 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:44 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:44 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:44 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:45 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:45 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:47 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:47 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:48 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:48 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:49 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:49 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:50 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:50 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:51 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:51 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:52 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:52 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:52 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:53 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:53 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:54 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:54 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:55 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:46:55 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:46:56 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:46:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.34 MASK 255.255.255.255 192.168.0.1
. 2018.03.09 03:46:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.09 03:46:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.09 03:46:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.09 03:46:56 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.09 03:46:56 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2018.03.09 03:46:56 - OpenVPN > Route addition fallback to route.exe
. 2018.03.09 03:46:56 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.09 03:46:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.09 03:46:57 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.09 03:46:57 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2018.03.09 03:46:57 - OpenVPN > Route addition fallback to route.exe
. 2018.03.09 03:46:57 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.09 03:46:57 - OpenVPN > SYSTEM ROUTING TABLE
. 2018.03.09 03:46:57 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.0.1 p=0 i=18 t=4 pr=3 a=284 h=0 m=35/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=18 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=329 h=0 m=331/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=329 h=0 m=331/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=329 h=0 m=331/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=18 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 169.254.0.0 255.255.0.0 169.254.111.60 p=0 i=15 t=3 pr=2 a=311 h=0 m=281/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 169.254.111.60 255.255.255.255 169.254.111.60 p=0 i=15 t=3 pr=2 a=311 h=0 m=281/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 169.254.255.255 255.255.255.255 169.254.111.60 p=0 i=15 t=3 pr=2 a=311 h=0 m=281/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 184.75.221.34 255.255.255.255 192.168.0.1 p=0 i=18 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 192.168.0.0 255.255.255.0 192.168.0.106 p=0 i=18 t=3 pr=2 a=284 h=0 m=291/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 192.168.0.106 255.255.255.255 192.168.0.106 p=0 i=18 t=3 pr=2 a=284 h=0 m=291/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 192.168.0.255 255.255.255.255 192.168.0.106 p=0 i=18 t=3 pr=2 a=284 h=0 m=291/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=329 h=0 m=331/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 224.0.0.0 240.0.0.0 169.254.111.60 p=0 i=15 t=3 pr=2 a=321 h=0 m=281/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.0.106 p=0 i=18 t=3 pr=2 a=293 h=0 m=291/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=329 h=0 m=331/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 255.255.255.255 255.255.255.255 169.254.111.60 p=0 i=15 t=3 pr=2 a=321 h=0 m=281/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.0.106 p=0 i=18 t=3 pr=2 a=293 h=0 m=291/0/0/0/0
. 2018.03.09 03:46:57 - OpenVPN > SYSTEM ADAPTER LIST
. 2018.03.09 03:46:57 - OpenVPN > Bluetooth Device (Personal Area Network)
. 2018.03.09 03:46:57 - OpenVPN >   Index = 19
. 2018.03.09 03:46:57 - OpenVPN >   GUID = {FF73D253-B412-432C-9D58-95F6DD9A5DDD}
. 2018.03.09 03:46:57 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2018.03.09 03:46:57 - OpenVPN >   MAC = 9c:b6:d0:69:62:c6
. 2018.03.09 03:46:57 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:46:57 - OpenVPN >   DHCP SERV =
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:46:57 2018
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 03:46:57 2018
. 2018.03.09 03:46:57 - OpenVPN >   DNS SERV =
. 2018.03.09 03:46:57 - OpenVPN > Killer E2400 Gigabit Ethernet Controller
. 2018.03.09 03:46:57 - OpenVPN >   Index = 12
. 2018.03.09 03:46:57 - OpenVPN >   GUID = {9F5A853D-711A-44AD-BA9F-A819A744480A}
. 2018.03.09 03:46:57 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2018.03.09 03:46:57 - OpenVPN >   MAC = 30:9c:23:16:42:1c
. 2018.03.09 03:46:57 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:46:57 - OpenVPN >   DHCP SERV =
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:46:57 2018
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 03:46:57 2018
. 2018.03.09 03:46:57 - OpenVPN >   DNS SERV =
. 2018.03.09 03:46:57 - OpenVPN > VirtualBox Host-Only Ethernet Adapter
. 2018.03.09 03:46:57 - OpenVPN >   Index = 15
. 2018.03.09 03:46:57 - OpenVPN >   GUID = {D38D06AB-4E68-4CB5-8F8F-73E397A5FDA6}
. 2018.03.09 03:46:57 - OpenVPN >   IP = 169.254.111.60/255.255.0.0
. 2018.03.09 03:46:57 - OpenVPN >   MAC = 0a:00:27:00:00:0f
. 2018.03.09 03:46:57 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:46:57 - OpenVPN >   DNS SERV =
. 2018.03.09 03:46:57 - OpenVPN > Killer Wireless-n/a/ac 1435 Wireless Network Adapter
. 2018.03.09 03:46:57 - OpenVPN >   Index = 18
. 2018.03.09 03:46:57 - OpenVPN >   GUID = {F5FE8409-8DAB-403D-B72A-C91CCA4AB46A}
. 2018.03.09 03:46:57 - OpenVPN >   IP = 192.168.0.106/255.255.255.0
. 2018.03.09 03:46:57 - OpenVPN >   MAC = 9c:b6:d0:69:62:c5
. 2018.03.09 03:46:57 - OpenVPN >   GATEWAY = 192.168.0.1/255.255.255.255
. 2018.03.09 03:46:57 - OpenVPN >   DHCP SERV = 192.168.0.1/255.255.255.255
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:42:13 2018
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 05:42:13 2018
. 2018.03.09 03:46:57 - OpenVPN >   DNS SERV = 192.168.0.1/255.255.255.255
. 2018.03.09 03:46:57 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter
. 2018.03.09 03:46:57 - OpenVPN >   Index = 16
. 2018.03.09 03:46:57 - OpenVPN >   GUID = {E7998082-B515-4956-80A8-5B371DDD1454}
. 2018.03.09 03:46:57 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2018.03.09 03:46:57 - OpenVPN >   MAC = 9e:b6:d0:69:62:c5
. 2018.03.09 03:46:57 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:46:57 - OpenVPN >   DHCP SERV =
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:46:57 2018
. 2018.03.09 03:46:57 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 03:46:57 2018
. 2018.03.09 03:46:57 - OpenVPN >   DNS SERV =
. 2018.03.09 03:46:57 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6
. 2018.03.09 03:46:57 - DNS leak protection with packet filtering enabled.
. 2018.03.09 03:46:57 - Flushing DNS
. 2018.03.09 03:47:00 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
! 2018.03.09 03:47:00 - Disconnecting
. 2018.03.09 03:47:00 - Sending management termination signal
. 2018.03.09 03:47:00 - Management - Send 'signal SIGTERM'
. 2018.03.09 03:47:05 - Connection terminated.
. 2018.03.09 03:47:05 - DNS leak protection with packet filtering disabled.
. 2018.03.09 03:47:05 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6
I 2018.03.09 03:47:08 - Checking authorization ...
! 2018.03.09 03:47:09 - Connecting to Alya (Canada, Toronto, Ontario)
. 2018.03.09 03:47:09 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.09 03:47:09 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.09 03:47:09 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.09 03:47:09 - Connection to OpenVPN Management Interface
. 2018.03.09 03:47:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.09 03:47:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:47:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:47:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443
. 2018.03.09 03:47:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.09 03:47:10 - OpenVPN > UDP link local: (not bound)
. 2018.03.09 03:47:10 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443
. 2018.03.09 03:47:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.09 03:47:10 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=c2bb2fdb 70bc9cbd
. 2018.03.09 03:47:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.09 03:47:10 - OpenVPN > VERIFY KU OK
. 2018.03.09 03:47:10 - OpenVPN > Validating certificate extended key usage
. 2018.03.09 03:47:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.09 03:47:10 - OpenVPN > VERIFY EKU OK
. 2018.03.09 03:47:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.09 03:47:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.09 03:47:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
. 2018.03.09 03:47:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.09 03:47:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.160 255.255.0.0,peer-id 45,cipher AES-256-GCM'
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.09 03:47:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.09 03:47:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.09 03:47:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:47:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:47:11 - OpenVPN > interactive service msg_channel=0
. 2018.03.09 03:47:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=9c:b6:d0:69:62:c5
. 2018.03.09 03:47:11 - OpenVPN > open_tun
. 2018.03.09 03:47:11 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{54E4978D-83FE-40FC-84CA-81CB88A9B9A1}.tap
. 2018.03.09 03:47:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.09 03:47:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.160/255.255.0.0 [sUCCEEDED]
. 2018.03.09 03:47:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.160/255.255.0.0 on interface {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.09 03:47:11 - OpenVPN > NOTE: FlushIpNetTable failed on interface [5] {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} (status=1168) : Element not found.
. 2018.03.09 03:47:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.09 03:47:16 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:16 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:22 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:22 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:22 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:23 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:23 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:24 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:24 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:25 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:25 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:27 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:27 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:28 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:28 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:28 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:29 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:29 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:30 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:30 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:30 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:31 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:32 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:32 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:32 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:32 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:33 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:33 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:34 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:34 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:35 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:35 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:35 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:36 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:36 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:36 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:37 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:38 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:39 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:39 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:40 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:40 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:41 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:41 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:42 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:42 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:46 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:46 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:46 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:47:46 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:47:47 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:47:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.170 MASK 255.255.255.255 192.168.0.1
. 2018.03.09 03:47:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.09 03:47:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.09 03:47:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.09 03:47:47 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.09 03:47:47 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2018.03.09 03:47:47 - OpenVPN > Route addition fallback to route.exe
. 2018.03.09 03:47:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.09 03:47:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
W 2018.03.09 03:47:47 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1
. 2018.03.09 03:47:47 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2018.03.09 03:47:47 - OpenVPN > Route addition fallback to route.exe
. 2018.03.09 03:47:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.09 03:47:47 - OpenVPN > SYSTEM ROUTING TABLE
. 2018.03.09 03:47:47 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.0.1 p=0 i=18 t=4 pr=3 a=333 h=0 m=35/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=18 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=378 h=0 m=331/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=378 h=0 m=331/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=378 h=0 m=331/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=18 t=4 pr=3 a=0 h=0 m=36/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 169.254.0.0 255.255.0.0 169.254.111.60 p=0 i=15 t=3 pr=2 a=360 h=0 m=281/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 169.254.111.60 255.255.255.255 169.254.111.60 p=0 i=15 t=3 pr=2 a=360 h=0 m=281/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 169.254.255.255 255.255.255.255 169.254.111.60 p=0 i=15 t=3 pr=2 a=360 h=0 m=281/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 184.75.221.170 255.255.255.255 192.168.0.1 p=0 i=18 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 192.168.0.0 255.255.255.0 192.168.0.106 p=0 i=18 t=3 pr=2 a=333 h=0 m=291/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 192.168.0.106 255.255.255.255 192.168.0.106 p=0 i=18 t=3 pr=2 a=333 h=0 m=291/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 192.168.0.255 255.255.255.255 192.168.0.106 p=0 i=18 t=3 pr=2 a=333 h=0 m=291/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=378 h=0 m=331/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 224.0.0.0 240.0.0.0 169.254.111.60 p=0 i=15 t=3 pr=2 a=370 h=0 m=281/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.0.106 p=0 i=18 t=3 pr=2 a=342 h=0 m=291/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=378 h=0 m=331/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 255.255.255.255 255.255.255.255 169.254.111.60 p=0 i=15 t=3 pr=2 a=370 h=0 m=281/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.0.106 p=0 i=18 t=3 pr=2 a=342 h=0 m=291/0/0/0/0
. 2018.03.09 03:47:47 - OpenVPN > SYSTEM ADAPTER LIST
. 2018.03.09 03:47:47 - OpenVPN > Bluetooth Device (Personal Area Network)
. 2018.03.09 03:47:47 - OpenVPN >   Index = 19
. 2018.03.09 03:47:47 - OpenVPN >   GUID = {FF73D253-B412-432C-9D58-95F6DD9A5DDD}
. 2018.03.09 03:47:47 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2018.03.09 03:47:47 - OpenVPN >   MAC = 9c:b6:d0:69:62:c6
. 2018.03.09 03:47:47 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:47:47 - OpenVPN >   DHCP SERV =
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:47:46 2018
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 03:47:46 2018
. 2018.03.09 03:47:47 - OpenVPN >   DNS SERV =
. 2018.03.09 03:47:47 - OpenVPN > Killer E2400 Gigabit Ethernet Controller
. 2018.03.09 03:47:47 - OpenVPN >   Index = 12
. 2018.03.09 03:47:47 - OpenVPN >   GUID = {9F5A853D-711A-44AD-BA9F-A819A744480A}
. 2018.03.09 03:47:47 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2018.03.09 03:47:47 - OpenVPN >   MAC = 30:9c:23:16:42:1c
. 2018.03.09 03:47:47 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:47:47 - OpenVPN >   DHCP SERV =
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:47:46 2018
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 03:47:46 2018
. 2018.03.09 03:47:47 - OpenVPN >   DNS SERV =
. 2018.03.09 03:47:47 - OpenVPN > VirtualBox Host-Only Ethernet Adapter
. 2018.03.09 03:47:47 - OpenVPN >   Index = 15
. 2018.03.09 03:47:47 - OpenVPN >   GUID = {D38D06AB-4E68-4CB5-8F8F-73E397A5FDA6}
. 2018.03.09 03:47:47 - OpenVPN >   IP = 169.254.111.60/255.255.0.0
. 2018.03.09 03:47:47 - OpenVPN >   MAC = 0a:00:27:00:00:0f
. 2018.03.09 03:47:47 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:47:47 - OpenVPN >   DNS SERV =
. 2018.03.09 03:47:47 - OpenVPN > Killer Wireless-n/a/ac 1435 Wireless Network Adapter
. 2018.03.09 03:47:47 - OpenVPN >   Index = 18
. 2018.03.09 03:47:47 - OpenVPN >   GUID = {F5FE8409-8DAB-403D-B72A-C91CCA4AB46A}
. 2018.03.09 03:47:47 - OpenVPN >   IP = 192.168.0.106/255.255.255.0
. 2018.03.09 03:47:47 - OpenVPN >   MAC = 9c:b6:d0:69:62:c5
. 2018.03.09 03:47:47 - OpenVPN >   GATEWAY = 192.168.0.1/255.255.255.255
. 2018.03.09 03:47:47 - OpenVPN >   DHCP SERV = 192.168.0.1/255.255.255.255
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:42:13 2018
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 05:42:13 2018
. 2018.03.09 03:47:47 - OpenVPN >   DNS SERV = 192.168.0.1/255.255.255.255
. 2018.03.09 03:47:47 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter
. 2018.03.09 03:47:47 - OpenVPN >   Index = 16
. 2018.03.09 03:47:47 - OpenVPN >   GUID = {E7998082-B515-4956-80A8-5B371DDD1454}
. 2018.03.09 03:47:47 - OpenVPN >   IP = 0.0.0.0/0.0.0.0
. 2018.03.09 03:47:47 - OpenVPN >   MAC = 9e:b6:d0:69:62:c5
. 2018.03.09 03:47:47 - OpenVPN >   GATEWAY = 0.0.0.0/255.255.255.255
. 2018.03.09 03:47:47 - OpenVPN >   DHCP SERV =
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE OBTAINED = Fri Mar 09 03:47:46 2018
. 2018.03.09 03:47:47 - OpenVPN >   DHCP LEASE EXPIRES  = Fri Mar 09 03:47:46 2018
. 2018.03.09 03:47:47 - OpenVPN >   DNS SERV =
. 2018.03.09 03:47:47 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6
. 2018.03.09 03:47:47 - DNS leak protection with packet filtering enabled.
. 2018.03.09 03:47:47 - Flushing DNS
. 2018.03.09 03:47:50 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
! 2018.03.09 03:47:50 - Disconnecting
. 2018.03.09 03:47:50 - Sending management termination signal
. 2018.03.09 03:47:50 - Management - Send 'signal SIGTERM'
. 2018.03.09 03:47:55 - Connection terminated.
. 2018.03.09 03:47:55 - DNS leak protection with packet filtering disabled.
. 2018.03.09 03:47:55 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6
I 2018.03.09 03:47:58 - Checking authorization ...
! 2018.03.09 03:47:59 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2018.03.09 03:47:59 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.09 03:47:59 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.09 03:47:59 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.09 03:47:59 - Connection to OpenVPN Management Interface
. 2018.03.09 03:47:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.09 03:47:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:47:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:47:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.42:443
. 2018.03.09 03:47:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.09 03:47:59 - OpenVPN > UDP link local: (not bound)
. 2018.03.09 03:47:59 - OpenVPN > UDP link remote: [AF_INET]184.75.221.42:443
. 2018.03.09 03:47:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.09 03:47:59 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.42:443, sid=7cf1256d f08a56f3
. 2018.03.09 03:47:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.09 03:47:59 - OpenVPN > VERIFY KU OK
. 2018.03.09 03:47:59 - OpenVPN > Validating certificate extended key usage
. 2018.03.09 03:47:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.09 03:47:59 - OpenVPN > VERIFY EKU OK
. 2018.03.09 03:47:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2018.03.09 03:48:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.09 03:48:00 - OpenVPN > [sualocin] Peer Connection Initiated with [AF_INET]184.75.221.42:443
. 2018.03.09 03:48:01 - OpenVPN > SENT CONTROL [sualocin]: 'PUSH_REQUEST' (status=1)
. 2018.03.09 03:48:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.46 255.255.0.0,peer-id 34,cipher AES-256-GCM'
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.09 03:48:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.09 03:48:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.09 03:48:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:48:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:48:01 - OpenVPN > interactive service msg_channel=0
. 2018.03.09 03:48:01 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=9c:b6:d0:69:62:c5
. 2018.03.09 03:48:01 - OpenVPN > open_tun
. 2018.03.09 03:48:01 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{54E4978D-83FE-40FC-84CA-81CB88A9B9A1}.tap
. 2018.03.09 03:48:01 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.09 03:48:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.4.46/255.255.0.0 [sUCCEEDED]
. 2018.03.09 03:48:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.4.46/255.255.0.0 on interface {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.09 03:48:01 - OpenVPN > NOTE: FlushIpNetTable failed on interface [5] {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} (status=1168) : Element not found.
. 2018.03.09 03:48:01 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.09 03:48:06 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:06 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:06 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:11 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:11 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:11 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:12 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:12 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:14 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:14 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:14 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:15 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:15 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:15 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:16 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:16 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:16 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:17 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:17 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:19 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:19 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:19 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:20 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:20 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:20 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:21 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:21 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:22 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:22 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:22 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:23 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:23 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:24 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:24 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:25 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:25 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:26 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:26 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:27 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:27 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:29 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:29 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:30 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:30 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:30 - Eddie Windows Interface Hack executed (Ethernet 3)
! 2018.03.09 03:48:30 - Disconnecting
. 2018.03.09 03:48:30 - Sending management termination signal
. 2018.03.09 03:48:30 - Management - Send 'signal SIGTERM'
. 2018.03.09 03:48:35 - Connection terminated.
I 2018.03.09 03:48:35 - Cancel requested.
. 2018.03.09 03:48:35 - IPv6 restored with packet filtering.
! 2018.03.09 03:48:35 - Session terminated.
I 2018.03.09 03:48:37 - Session starting.
. 2018.03.09 03:48:37 - IPv6 disabled with packet filtering.
I 2018.03.09 03:48:37 - Checking authorization ...
! 2018.03.09 03:48:38 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2018.03.09 03:48:38 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.09 03:48:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.09 03:48:38 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.09 03:48:38 - Connection to OpenVPN Management Interface
. 2018.03.09 03:48:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.09 03:48:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:48:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:48:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.42:443
. 2018.03.09 03:48:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.09 03:48:38 - OpenVPN > UDP link local: (not bound)
. 2018.03.09 03:48:38 - OpenVPN > UDP link remote: [AF_INET]184.75.221.42:443
. 2018.03.09 03:48:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.09 03:48:38 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.42:443, sid=9d820376 9d975935
. 2018.03.09 03:48:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.09 03:48:38 - OpenVPN > VERIFY KU OK
. 2018.03.09 03:48:38 - OpenVPN > Validating certificate extended key usage
. 2018.03.09 03:48:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.09 03:48:38 - OpenVPN > VERIFY EKU OK
. 2018.03.09 03:48:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2018.03.09 03:48:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.09 03:48:38 - OpenVPN > [sualocin] Peer Connection Initiated with [AF_INET]184.75.221.42:443
. 2018.03.09 03:48:39 - OpenVPN > SENT CONTROL [sualocin]: 'PUSH_REQUEST' (status=1)
. 2018.03.09 03:48:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.46 255.255.0.0,peer-id 31,cipher AES-256-GCM'
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.09 03:48:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.09 03:48:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.09 03:48:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:48:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:48:39 - OpenVPN > interactive service msg_channel=0
. 2018.03.09 03:48:39 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=9c:b6:d0:69:62:c5
. 2018.03.09 03:48:39 - OpenVPN > open_tun
. 2018.03.09 03:48:39 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{54E4978D-83FE-40FC-84CA-81CB88A9B9A1}.tap
. 2018.03.09 03:48:39 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.09 03:48:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.4.46/255.255.0.0 [sUCCEEDED]
. 2018.03.09 03:48:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.4.46/255.255.0.0 on interface {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.09 03:48:39 - OpenVPN > NOTE: FlushIpNetTable failed on interface [5] {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} (status=1168) : Element not found.
. 2018.03.09 03:48:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.09 03:48:45 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:45 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:49 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:49 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:50 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:50 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:51 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:51 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:52 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:52 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:52 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:53 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:53 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:54 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:54 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:55 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:55 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:56 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:56 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:56 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:58 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:58 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:48:59 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:48:59 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:48:59 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:00 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:00 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:01 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:01 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:01 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:02 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:02 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:03 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:03 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:03 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:04 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:04 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:04 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:05 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:05 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:05 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:06 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:06 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:06 - Eddie Windows Interface Hack executed (Ethernet 3)
! 2018.03.09 03:49:06 - Disconnecting
. 2018.03.09 03:49:06 - Sending management termination signal
. 2018.03.09 03:49:06 - Management - Send 'signal SIGTERM'
. 2018.03.09 03:49:11 - Connection terminated.
I 2018.03.09 03:49:11 - Cancel requested.
. 2018.03.09 03:49:11 - IPv6 restored with packet filtering.
! 2018.03.09 03:49:11 - Session terminated.
! 2018.03.09 03:49:30 - Deactivation of Network Lock
I 2018.03.09 03:49:31 - Session starting.
. 2018.03.09 03:49:31 - IPv6 disabled with packet filtering.
I 2018.03.09 03:49:31 - Checking authorization ...
! 2018.03.09 03:49:32 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2018.03.09 03:49:32 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.03.09 03:49:32 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.09 03:49:32 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.09 03:49:32 - Connection to OpenVPN Management Interface
. 2018.03.09 03:49:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.09 03:49:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:49:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.03.09 03:49:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.42:443
. 2018.03.09 03:49:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.09 03:49:33 - OpenVPN > UDP link local: (not bound)
. 2018.03.09 03:49:33 - OpenVPN > UDP link remote: [AF_INET]184.75.221.42:443
. 2018.03.09 03:49:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.09 03:49:33 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.42:443, sid=935110ce 6fdb27cd
. 2018.03.09 03:49:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.09 03:49:33 - OpenVPN > VERIFY KU OK
. 2018.03.09 03:49:33 - OpenVPN > Validating certificate extended key usage
. 2018.03.09 03:49:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.09 03:49:33 - OpenVPN > VERIFY EKU OK
. 2018.03.09 03:49:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2018.03.09 03:49:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.09 03:49:33 - OpenVPN > [sualocin] Peer Connection Initiated with [AF_INET]184.75.221.42:443
. 2018.03.09 03:49:34 - OpenVPN > SENT CONTROL [sualocin]: 'PUSH_REQUEST' (status=1)
. 2018.03.09 03:49:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.46 255.255.0.0,peer-id 34,cipher AES-256-GCM'
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.09 03:49:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.09 03:49:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.09 03:49:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:49:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.09 03:49:34 - OpenVPN > interactive service msg_channel=0
. 2018.03.09 03:49:34 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=9c:b6:d0:69:62:c5
. 2018.03.09 03:49:34 - OpenVPN > open_tun
. 2018.03.09 03:49:34 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{54E4978D-83FE-40FC-84CA-81CB88A9B9A1}.tap
. 2018.03.09 03:49:34 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.09 03:49:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.4.46/255.255.0.0 [sUCCEEDED]
. 2018.03.09 03:49:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.4.46/255.255.0.0 on interface {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.03.09 03:49:34 - OpenVPN > NOTE: FlushIpNetTable failed on interface [5] {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} (status=1168) : Element not found.
. 2018.03.09 03:49:34 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.03.09 03:49:39 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:39 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:44 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:44 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:45 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:45 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:47 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:47 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:48 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:48 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:49 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:49 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:50 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:50 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:52 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:52 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:52 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:53 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:53 - Eddie Windows Interface Hack executed (Ethernet 3)
. 2018.03.09 03:49:54 - OpenVPN > TEST ROUTES: 0/1 succeeded len=0 ret=0 a=0 u/d=up
. 2018.03.09 03:49:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.03.09 03:49:54 - Eddie Windows Interface Hack executed (Ethernet 3)
! 2018.03.09 03:49:55 - Disconnecting
. 2018.03.09 03:49:55 - Sending management termination signal
. 2018.03.09 03:49:55 - Management - Send 'signal SIGTERM'
 

Share this post


Link to post

Hello!

 

Please:

 

  • Ensure you're properly connected to your network. Whether through WiFi or a Wired connection.
  • Go to Eddie's preferences>Protocols>Change to TCP 443.
  • Go to Windows Internet and Sharing>Network Adapters>Right-click each adapter and go to its properties and uncheck IP6.
  • In the same place, click the TAP adapter and disable it. Then re-enable it. Then connect with Eddie again. This is a quick fix for TAP issues.
  • Check no third-party security software could be interfering.

Otherwise you're welcome to try the experimental client. Instructions for how, can be found in the link in my signature .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hello!

 

The tun/tap interface does not come up. In several cases the excellent recommendations by LZ1 will fix the problem. In some other cases, some additional steps are necessary, please see below.

If the problem persists after you have disabled any third-party antivirus and firewall, and you have also ascertained that the tun/tap interface is "Enabled", please try to set the tun/tap interface to "Always connected":

  • Go into device manager
  • Find your TUN/TAP Adapter
  • Right click on it
  • Select "Properties"
  • Select "Advanced Media Status"
  • Set it to "Always Connected"
  • Click "Ok"
  • Reboot the computer.

After the system has restarted, please insert the following directives in Eddie window "AirVPN" > "Preferences" > "OVPN Directives",  "Custom directives" box:

 

route-method exe
route-delay 5 120

and test again.

Kind regards

Share this post


Link to post

Hello!

 

The tun/tap interface does not come up. In several cases the excellent recommendations by LZ1 will fix the problem. In some other cases, some additional steps are necessary, please see below.

If the problem persists after you have disabled any third-party antivirus and firewall, and you have also ascertained that the tun/tap interface is "Enabled", please try to set the tun/tap interface to "Always connected":

  • Go into device manager
  • Find your TUN/TAP Adapter
  • Right click on it
  • Select "Properties"
  • Select "Advanced Media Status"
  • Set it to "Always Connected"
  • Click "Ok"
  • Reboot the computer.

After the system has restarted, please insert the following directives in Eddie window "AirVPN" > "Preferences" > "OVPN Directives",  "Custom directives" box:

 

route-method exe
route-delay 5 120

and test again.

 

Kind regards

Thank you for posting Staff and it was great you posted the path to the other solution, meticulously as always, as I keep forgetting the steps .

 

It's the first I see of this entry though:

 

. 2018.03.09 03:48:39 - OpenVPN > NOTE: FlushIpNetTable failed on interface [5] {54E4978D-83FE-40FC-84CA-81CB88A9B9A1} (status=1168) : Element not found.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

One of these items fixed the same problem for me -- thanks!!

 

 

 

  • Go to Eddie's preferences>Protocols>Change to TCP 443.
  • Go to Windows Internet and Sharing>Network Adapters>Right-click each adapter and go to its properties and uncheck IP6.
  • In the same place, click the TAP adapter and disable it. Then re-enable it. Then connect with Eddie again. This is a quick fix for TAP issues.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...