Jump to content
Not connected, Your IP: 3.128.168.176

Recommended Posts

Hello.

 

I know this has been asked a number of times and I hate to be that guy but i'm running out of ideas and things to try.

 

Without a vpn I get 220mpbs.  With this one VPN provider I can get 199mbps using AES-256.  With AirVpn the speed ranges anywhere from 120mpbs and way below.  This is all using servers in the same country i'm in.

 

I've tried the protocols one by one,  put my router in modem mode,  tired various buffer sizes,  turned off my firewall,  and I can't seem to ever get above 120mpbs,  I know it's not a slow speed by any means and I've looked at the server info page so I know these fast speeds are achievable  but it's still quite a bit of a difference compared to the other VPN service.

 

I don't want to give up just yet as I quite like the user interface on the 'Eddie' application and all the information and options it gives you,   can anyone think of anything else I could try?  

Share this post


Link to post

Hello,

 

please post Eddie system report ("Logs" > life belt icon > copy all > paste), it will tell us your Operating System exact version and many other settings that might help in tuning.

 

Kind regards

Share this post


Link to post
Everything has been done via a cabled LAN connection as well.  ( you probably tell anyway)  UDP 53 protocol has been the fastest for me so far.

 

 


Eddie System/Environment Report - 15/03/2018 20:57 UTC

 

Eddie version: 2.13.6

Eddie OS build: windows_x64

Eddie architecture: x64

OS type: Windows

OS name: Windows 10 Home

OS version: Microsoft Windows NT 10.0.16299.0

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2

OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (D:\Program Files\AirVPN\openvpn.exe)

SSH: plink 0.67 (D:\Program Files\AirVPN\plink.exe)

SSL: stunnel 5.40 (D:\Program Files\AirVPN\stunnel.exe)

curl: 7.54.1 (D:\Program Files\AirVPN\curl.exe)

Profile path: D:\Program Files\AirVPN\AirVPN.xml

Data path: D:\Program Files\AirVPN

Application path: D:\Program Files\AirVPN

Executable path: D:\Program Files\AirVPN\AirVPN.exe

Command line arguments: (0 args) 

Network Lock Active: Yes, Windows Filtering Platform

Connected to VPN: Yes, Eddie.Core.StatsEntry

Detected DNS: 10.8.0.1, 194.168.4.100, 194.168.8.100

Test DNS IPv4: Ok

Test DNS IPv6: Failed

----------------------------

Test HTTP:

 

Status: HTTP/1.1 200 OK

 - Headers: server:nginx;date:Fri, 16 Mar 2018 11:36:51 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.

 

----------------------------

Test HTTPS:

 

Status: HTTP/2 200 

 - Headers: server:nginx;date:Fri, 16 Mar 2018 11:36:52 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success.

 

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

servers.whitelist: 5e26cb294a9ad309deaf20c36b6841d87e6574a5324e3056350d06fa7de94409,20dc8ad0bdcd308532e267288a96f544097973189da6b23cf9343aed601d6b09,4d8372743530ac3f7b095f63b52f1240f1195595c4aa76ef63d01a77aafa7fb5,4a419d140de6bb51cc57b98a05e8e55b0360377d26e2fc80666a2a42702f6509,17388082e9599070763fffe8f5096959cd23e3f311ea0aa8448c01fdbe26799d,f43b39ea311b6bd9c81da7499d13c171e06dfa120c83ac2d04aaea8f98e52b7e,2f7a2594332f2669a527e669a1de0f4bf76f8243cd4c58af44f51c9fd50b9fb2,f49f4b1a23b27a0d9499a5000cc7204fda24b6c54e724cc0f42cdccec0e87faf,eb1b1573931f127e991a7cd60ed29c14133dfc19ef4efd304130d936fc58024a,a0dc65ec7d0eae3d122aa4c626c3255d8880b922fe97937e0218b7054f62508d

servers.blacklist: 0c499ba24c0f0a5054319c7c1375746d0213cdd662573440d7612e87b564147f

servers.locklast: True

areas.whitelist: es,nl,se

mode.protocol: UDP

mode.port: 53

ipv6.mode: none

openvpn.sndbuf: 524288

openvpn.rcvbuf: 524288

pinger.enabled: False

 

----------------------------

Logs:

 

. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:50:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:50:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.15 20:50:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:50:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.15 20:50:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:50:31 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:50:31 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:50:31 - OpenVPN > open_tun

. 2018.03.15 20:50:31 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:50:31 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:50:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.38.189/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:50:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.38.189/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2018.03.15 20:50:31 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:50:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:50:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:50:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:50:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:50:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:50:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2018.03.15 20:50:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:50:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:50:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2018.03.15 20:50:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:50:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:50:36 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:50:36 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:50:36 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:50:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)

. 2018.03.15 20:50:36 - Flushing DNS

I 2018.03.15 20:50:39 - Checking route

I 2018.03.15 20:50:40 - Checking DNS

! 2018.03.15 20:50:52 - Connected.

. 2018.03.15 20:50:52 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:55:02 - Disconnecting

. 2018.03.15 20:55:02 - Sending management termination signal

. 2018.03.15 20:55:02 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:55:07 - Connection terminated.

. 2018.03.15 20:55:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:55:07 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:55:07 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:55:07 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:55:07 - Checking authorization ...

! 2018.03.15 20:55:08 - Connecting to Asterion (United Kingdom, London)

. 2018.03.15 20:55:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:55:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:55:08 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:55:08 - Connection to OpenVPN Management Interface

. 2018.03.15 20:55:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:55:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:55:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:55:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.151.98.167:443

. 2018.03.15 20:55:08 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:55:08 - OpenVPN > UDP link local: (not bound)

. 2018.03.15 20:55:08 - OpenVPN > UDP link remote: [AF_INET]217.151.98.167:443

. 2018.03.15 20:55:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:55:08 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.167:443, sid=589b31d4 0e867e99

. 2018.03.15 20:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:55:08 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:55:08 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:55:08 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:55:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:55:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.167:443

. 2018.03.15 20:55:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:55:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.22.83 255.255.0.0'

. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:55:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:55:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.15 20:55:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:55:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.15 20:55:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:55:09 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:55:09 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:55:09 - OpenVPN > open_tun

. 2018.03.15 20:55:09 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:55:09 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:55:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.22.83/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:55:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.22.83/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2018.03.15 20:55:09 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:55:09 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:55:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:55:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 217.151.98.167 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:55:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2018.03.15 20:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:55:14 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2018.03.15 20:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:55:14 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:55:14 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:55:14 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:55:15 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)

. 2018.03.15 20:55:15 - Flushing DNS

I 2018.03.15 20:55:18 - Checking route

I 2018.03.15 20:55:18 - Checking DNS

! 2018.03.15 20:55:30 - Connected.

. 2018.03.15 20:55:30 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:56:32 - Disconnecting

. 2018.03.15 20:56:32 - Sending management termination signal

. 2018.03.15 20:56:32 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:56:37 - Connection terminated.

. 2018.03.15 20:56:37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:56:37 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:56:37 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:56:37 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:56:37 - Checking authorization ...

! 2018.03.15 20:56:37 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:56:37 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:56:37 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:56:37 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:56:37 - Connection to OpenVPN Management Interface

. 2018.03.15 20:56:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:56:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:56:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:56:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:80

. 2018.03.15 20:56:38 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:56:38 - OpenVPN > UDP link local: (not bound)

. 2018.03.15 20:56:38 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:80

. 2018.03.15 20:56:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:56:38 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:80, sid=0c2cfe67 04e855e3

. 2018.03.15 20:56:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:56:38 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:56:38 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:56:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:56:38 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:56:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:56:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:56:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:80

. 2018.03.15 20:56:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:56:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.27 255.255.0.0,peer-id 1,cipher AES-256-GCM'

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.15 20:56:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:56:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:56:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:56:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:56:39 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:56:39 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:56:39 - OpenVPN > open_tun

. 2018.03.15 20:56:39 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:56:39 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:56:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.27/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:56:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.27/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.6.255.254, lease-time: 31536000]

. 2018.03.15 20:56:39 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:56:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:56:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:56:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:56:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:56:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:56:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1

. 2018.03.15 20:56:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:56:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:56:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1

. 2018.03.15 20:56:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:56:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:56:45 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:56:45 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:56:45 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:56:45 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.6.0.1) to 10.6.0.1)

. 2018.03.15 20:56:45 - Flushing DNS

I 2018.03.15 20:56:48 - Checking route

I 2018.03.15 20:56:48 - Checking DNS

! 2018.03.15 20:57:00 - Connected.

. 2018.03.15 20:57:00 - OpenVPN > Initialization Sequence Completed

. 2018.03.15 20:58:25 - Updating systems & servers data ...

. 2018.03.15 20:58:27 - Systems & servers data update completed

! 2018.03.15 20:58:51 - Disconnecting

. 2018.03.15 20:58:51 - Sending management termination signal

. 2018.03.15 20:58:51 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:58:56 - Connection terminated.

. 2018.03.15 20:58:56 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:58:56 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:58:56 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:58:56 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:58:56 - Checking authorization ...

! 2018.03.15 20:58:56 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Reading configuration from file D:\Program Files\AirVPN\fc16cb516fe867d9b55d369bfc519a60fd5552c212b4d48c93fb04367574e338.tmp.ssl

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: UTF-8 byte order mark not detected

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG6[ui]: Initializing service [openvpn]

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks

. 2018.03.15 20:58:56 - SSL > 2018.03.15 20:58:56 LOG5[ui]: Configuration successful

. 2018.03.15 20:58:56 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:58:56 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:58:56 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:58:56 - Connection to OpenVPN Management Interface

. 2018.03.15 20:58:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:58:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:58:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:58:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:57947

. 2018.03.15 20:58:57 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:58:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:57947 [nonblock]

. 2018.03.15 20:58:57 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:57947

. 2018.03.15 20:58:57 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2018.03.15 20:58:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:57947

. 2018.03.15 20:58:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:8894

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: s_connect: connecting 80.84.49.51:443

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG5[0]: s_connect: connected 80.84.49.51:443

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.24:8895

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: SNI: sending servername: 80.84.49.51

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Peer certificate not required

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Certificate verification disabled

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Client certificate not requested

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: TLS connected: new session negotiated

. 2018.03.15 20:58:57 - SSL > 2018.03.15 20:58:57 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)

. 2018.03.15 20:58:57 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:57947, sid=13677e1a ba555f8e

. 2018.03.15 20:58:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:58:57 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:58:57 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:58:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:58:57 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:58:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:58:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:58:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:57947

. 2018.03.15 20:58:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:58:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.240 255.255.0.0,peer-id 0,cipher AES-256-GCM'

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627

. 2018.03.15 20:58:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:58:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:58:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:58:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:58:58 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:58:58 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:58:58 - OpenVPN > open_tun

. 2018.03.15 20:58:58 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:58:58 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:58:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.240/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:58:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.240/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.50.255.254, lease-time: 31536000]

. 2018.03.15 20:58:58 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:58:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:59:03 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1

. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1

. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:59:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.51 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:59:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:59:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:59:04 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:59:04 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:59:04 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:59:04 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)

. 2018.03.15 20:59:04 - Flushing DNS

I 2018.03.15 20:59:07 - Checking route

I 2018.03.15 20:59:07 - Checking DNS

! 2018.03.15 20:59:19 - Connected.

. 2018.03.15 20:59:19 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:59:41 - Disconnecting

. 2018.03.15 20:59:41 - Sending management termination signal

. 2018.03.15 20:59:41 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:59:51 - Sending soft termination signal

. 2018.03.15 20:59:51 - Connection terminated.

. 2018.03.15 20:59:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:59:51 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:59:51 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:59:51 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

. 2018.03.15 20:59:51 - Flushing DNS

. 2018.03.15 20:59:54 - IPv6 restored with packet filtering.

! 2018.03.15 20:59:54 - Session terminated.

I 2018.03.15 21:00:01 - Session starting.

. 2018.03.15 21:00:01 - IPv6 disabled with packet filtering.

I 2018.03.15 21:00:01 - Checking authorization ...

! 2018.03.15 21:00:01 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 21:00:01 - SSH > Looking up host "80.84.49.4"

. 2018.03.15 21:00:01 - SSH > Connecting to 80.84.49.4 port 22

. 2018.03.15 21:00:01 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67

. 2018.03.15 21:00:01 - SSH > Server version: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u2

. 2018.03.15 21:00:01 - SSH > Using SSH protocol version 2

. 2018.03.15 21:00:01 - SSH > Doing Diffie-Hellman group exchange

. 2018.03.15 21:00:01 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256

. 2018.03.15 21:00:01 - SSH > Host key fingerprint is:

. 2018.03.15 21:00:01 - SSH > ssh-rsa 2048 e3:2e:ee:7f:2c:20:8b:dc:78:a3:e2:a5:fd:c4:cf:13

. 2018.03.15 21:00:01 - SSH > The server's host key is not cached in the registry. You

. 2018.03.15 21:00:01 - SSH > have no guarantee that the server is the computer you

. 2018.03.15 21:00:01 - SSH > think it is.

. 2018.03.15 21:00:01 - SSH > The server's rsa2 key fingerprint is:

. 2018.03.15 21:00:01 - SSH > ssh-rsa 2048 e3:2e:ee:7f:2c:20:8b:dc:78:a3:e2:a5:fd:c4:cf:13

. 2018.03.15 21:00:01 - SSH > If you trust this host, enter "y" to add the key to

. 2018.03.15 21:00:01 - SSH > PuTTY's cache and carry on connecting.

. 2018.03.15 21:00:01 - SSH > If you want to carry on connecting just once, without

. 2018.03.15 21:00:01 - SSH > adding the key to the cache, enter "n".

. 2018.03.15 21:00:01 - SSH > If you do not trust this host, press Return to abandon the

. 2018.03.15 21:00:01 - SSH > connection.

. 2018.03.15 21:00:01 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption

. 2018.03.15 21:00:01 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm

. 2018.03.15 21:00:01 - SSH > Initialised AES-256 SDCTR server->client encryption

. 2018.03.15 21:00:01 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm

. 2018.03.15 21:00:01 - SSH > Reading private key file "D:\Program Files\AirVPN\7020f2cf7cfe781f25126d9e5405a185eaf5f23f55fdada3d41f110d15b24b45.tmp.ppk"

. 2018.03.15 21:00:01 - SSH > Using username "sshtunnel".

. 2018.03.15 21:00:01 - SSH > Offered public key

. 2018.03.15 21:00:02 - SSH > Offer of public key accepted

. 2018.03.15 21:00:02 - SSH > Authenticating with public key ""

. 2018.03.15 21:00:02 - SSH > Sent public key signature

. 2018.03.15 21:00:02 - SSH > Access granted

. 2018.03.15 21:00:02 - SSH > Local port 33166 forwarding to 127.0.0.1:2018

. 2018.03.15 21:00:02 - SSH > Remote debug message: PTY allocation disabled.

. 2018.03.15 21:00:02 - SSH > Remote debug message: X11 forwarding disabled.

. 2018.03.15 21:00:02 - SSH > Remote debug message: Forced command.

. 2018.03.15 21:00:02 - SSH > Remote debug message: PTY allocation disabled.

. 2018.03.15 21:00:02 - SSH > Remote debug message: X11 forwarding disabled.

. 2018.03.15 21:00:02 - SSH > Remote debug message: Forced command.

. 2018.03.15 21:00:02 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 21:00:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 21:00:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 21:00:02 - Connection to OpenVPN Management Interface

. 2018.03.15 21:00:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 21:00:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 21:00:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 21:00:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:33166

. 2018.03.15 21:00:02 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 21:00:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:33166 [nonblock]

. 2018.03.15 21:00:02 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:33166

. 2018.03.15 21:00:02 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2018.03.15 21:00:02 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:33166

. 2018.03.15 21:00:02 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:9328

. 2018.03.15 21:00:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 21:00:02 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:33166, sid=4ca48219 346cd084

. 2018.03.15 21:00:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 21:00:02 - OpenVPN > VERIFY KU OK

. 2018.03.15 21:00:02 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 21:00:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 21:00:02 - OpenVPN > VERIFY EKU OK

. 2018.03.15 21:00:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 21:00:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 21:00:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:33166

. 2018.03.15 21:00:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 21:00:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.240 255.255.0.0,peer-id 0,cipher AES-256-GCM'

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627

. 2018.03.15 21:00:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 21:00:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 21:00:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 21:00:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 21:00:03 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 21:00:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 21:00:03 - OpenVPN > open_tun

. 2018.03.15 21:00:03 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 21:00:03 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 21:00:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.240/255.255.0.0 [sUCCEEDED]

. 2018.03.15 21:00:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.240/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.50.255.254, lease-time: 31536000]

. 2018.03.15 21:00:03 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 21:00:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 21:00:08 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1

. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1

. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 21:00:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 21:00:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 21:00:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 21:00:08 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 21:00:08 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 21:00:08 - DNS leak protection with packet filtering enabled.

. 2018.03.15 21:00:08 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.50.0.1) to 10.50.0.1)

. 2018.03.15 21:00:08 - Flushing DNS

I 2018.03.15 21:00:11 - Checking route

I 2018.03.15 21:00:12 - Checking DNS

! 2018.03.15 21:00:24 - Connected.

. 2018.03.15 21:00:24 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 21:01:07 - Disconnecting

. 2018.03.15 21:01:07 - Sending management termination signal

. 2018.03.15 21:01:07 - Management - Send 'signal SIGTERM'

. 2018.03.15 21:01:17 - Sending soft termination signal

. 2018.03.15 21:01:17 - Connection terminated.

. 2018.03.15 21:01:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 21:01:17 - DNS leak protection with packet filtering disabled.

. 2018.03.15 21:01:17 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 21:01:17 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 21:01:17 - Checking authorization ...

! 2018.03.15 21:01:17 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:18 - Disconnecting

. 2018.03.15 21:01:18 - Connection terminated.

I 2018.03.15 21:01:21 - Checking authorization ...

! 2018.03.15 21:01:21 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:21 - Disconnecting

. 2018.03.15 21:01:21 - Connection terminated.

I 2018.03.15 21:01:24 - Checking authorization ...

! 2018.03.15 21:01:24 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:24 - Disconnecting

. 2018.03.15 21:01:24 - Connection terminated.

I 2018.03.15 21:01:27 - Checking authorization ...

! 2018.03.15 21:01:28 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:28 - Disconnecting

. 2018.03.15 21:01:28 - Connection terminated.

I 2018.03.15 21:01:31 - Checking authorization ...

! 2018.03.15 21:01:31 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:31 - Disconnecting

. 2018.03.15 21:01:31 - Connection terminated.

I 2018.03.15 21:01:34 - Checking authorization ...

! 2018.03.15 21:01:34 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:34 - Disconnecting

. 2018.03.15 21:01:34 - Connection terminated.

I 2018.03.15 21:01:37 - Checking authorization ...

! 2018.03.15 21:01:38 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:38 - Disconnecting

. 2018.03.15 21:01:38 - Connection terminated.

I 2018.03.15 21:01:41 - Checking authorization ...

! 2018.03.15 21:01:41 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:41 - Disconnecting

. 2018.03.15 21:01:41 - Connection terminated.

I 2018.03.15 21:01:44 - Checking authorization ...

! 2018.03.15 21:01:44 - Connecting to Algedi (United Kingdom, London)

! 2018.03.15 21:01:45 - Disconnecting

. 2018.03.15 21:01:45 - Connection terminated.

I 2018.03.15 21:01:48 - Checking authorization ...

. 2018.03.15 21:01:48 - Flushing DNS

. 2018.03.15 21:01:51 - IPv6 restored with packet filtering.

! 2018.03.15 21:01:51 - Session terminated.

! 2018.03.15 21:02:59 - Deactivation of Network Lock

. 2018.03.15 21:08:43 - Updating systems & servers data ...

. 2018.03.15 21:08:44 - Systems & servers data update completed

. 2018.03.15 21:19:20 - Updating systems & servers data ...

. 2018.03.15 21:19:20 - Systems & servers data update completed

I 2018.03.15 20:32:05 - Session starting.

I 2018.03.15 20:32:05 - Checking authorization ...

! 2018.03.15 20:32:05 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:32:05 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:32:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:32:05 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:32:05 - Connection to OpenVPN Management Interface

. 2018.03.15 20:32:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:32:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:32:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:32:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:1194

. 2018.03.15 20:32:05 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:32:05 - OpenVPN > Attempting to establish TCP connection with [AF_INET]80.84.49.4:1194 [nonblock]

. 2018.03.15 20:32:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:32:06 - OpenVPN > TCP connection established with [AF_INET]80.84.49.4:1194

. 2018.03.15 20:32:06 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2018.03.15 20:32:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]80.84.49.4:1194

. 2018.03.15 20:32:06 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:1194, sid=393b0ee1 5a33104e

. 2018.03.15 20:32:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:32:06 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:32:06 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:32:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:32:06 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:32:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:32:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:32:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:1194

! 2018.03.15 20:32:07 - Disconnecting

. 2018.03.15 20:32:07 - Sending management termination signal

. 2018.03.15 20:32:07 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:32:07 - Connection terminated.

I 2018.03.15 20:32:07 - Cancel requested.

! 2018.03.15 20:32:07 - Session terminated.

! 2018.03.15 20:32:09 - Activation of Network Lock - Windows Filtering Platform

I 2018.03.15 20:32:37 - Session starting.

I 2018.03.15 20:32:38 - Checking authorization ...

! 2018.03.15 20:32:38 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:32:38 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:32:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:32:38 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:32:38 - Connection to OpenVPN Management Interface

. 2018.03.15 20:32:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:32:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:32:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:32:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:2018

. 2018.03.15 20:32:38 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:32:38 - OpenVPN > UDP link local: (not bound)

. 2018.03.15 20:32:38 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:2018

. 2018.03.15 20:32:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:32:38 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:2018, sid=781441b6 35eedc63

. 2018.03.15 20:32:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:32:38 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:32:38 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:32:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:32:38 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:32:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:32:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:32:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:2018

. 2018.03.15 20:32:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:32:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.30.0.1,route-gateway 10.30.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.30.0.75 255.255.0.0,peer-id 4,cipher AES-256-GCM'

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.15 20:32:39 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:32:39 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:32:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:32:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:32:39 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:32:39 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:32:39 - OpenVPN > open_tun

. 2018.03.15 20:32:39 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:32:39 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:32:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.0.0/10.30.0.75/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:32:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.0.75/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.30.255.254, lease-time: 31536000]

. 2018.03.15 20:32:39 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:32:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:32:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:32:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:32:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:32:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:32:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.0.1

. 2018.03.15 20:32:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:32:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:32:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.0.1

. 2018.03.15 20:32:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:32:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:32:44 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:32:44 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:32:44 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:32:45 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.30.0.1) to 10.30.0.1)

. 2018.03.15 20:32:45 - Flushing DNS

I 2018.03.15 20:32:48 - Checking route

I 2018.03.15 20:32:48 - Checking DNS

! 2018.03.15 20:33:03 - Connected.

. 2018.03.15 20:33:03 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:34:26 - Disconnecting

. 2018.03.15 20:34:26 - Sending management termination signal

. 2018.03.15 20:34:26 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:34:31 - Connection terminated.

. 2018.03.15 20:34:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:34:31 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:34:31 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:34:31 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

. 2018.03.15 20:34:31 - Flushing DNS

! 2018.03.15 20:34:34 - Session terminated.

I 2018.03.15 20:34:43 - Session starting.

I 2018.03.15 20:34:44 - Checking authorization ...

! 2018.03.15 20:34:44 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:34:44 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:34:44 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:34:44 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:34:44 - Connection to OpenVPN Management Interface

. 2018.03.15 20:34:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:34:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:34:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:34:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:41185

. 2018.03.15 20:34:44 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:34:44 - OpenVPN > UDP link local: (not bound)

. 2018.03.15 20:34:44 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:41185

. 2018.03.15 20:34:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:34:44 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:41185, sid=5a78c932 d6331fe7

. 2018.03.15 20:34:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:34:44 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:34:44 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:34:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:34:44 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:34:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:34:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:34:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:41185

. 2018.03.15 20:34:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:34:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.30.0.1,route-gateway 10.30.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.30.0.75 255.255.0.0,peer-id 4,cipher AES-256-GCM'

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.15 20:34:45 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:34:45 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:34:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:34:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:34:45 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:34:45 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:34:45 - OpenVPN > open_tun

. 2018.03.15 20:34:45 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:34:45 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:34:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.0.0/10.30.0.75/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:34:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.0.75/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.30.255.254, lease-time: 31536000]

. 2018.03.15 20:34:45 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:34:45 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:34:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:34:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:34:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:34:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:34:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.0.1

. 2018.03.15 20:34:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:34:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:34:51 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.0.1

. 2018.03.15 20:34:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:34:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:34:51 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:34:51 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:34:51 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:34:51 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.30.0.1) to 10.30.0.1)

. 2018.03.15 20:34:51 - Flushing DNS

I 2018.03.15 20:34:54 - Checking route

I 2018.03.15 20:34:54 - Checking DNS

! 2018.03.15 20:35:06 - Connected.

. 2018.03.15 20:35:06 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:35:43 - Disconnecting

. 2018.03.15 20:35:43 - Sending management termination signal

. 2018.03.15 20:35:43 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:35:48 - Connection terminated.

. 2018.03.15 20:35:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:35:48 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:35:48 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:35:48 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:35:48 - Checking authorization ...

! 2018.03.15 20:35:48 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:35:48 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:35:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:35:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:35:48 - Connection to OpenVPN Management Interface

. 2018.03.15 20:35:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:35:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:35:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:35:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:80

. 2018.03.15 20:35:48 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:35:48 - OpenVPN > UDP link local: (not bound)

. 2018.03.15 20:35:48 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:80

. 2018.03.15 20:35:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:35:48 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:80, sid=f64dbab0 e03c111c

. 2018.03.15 20:35:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:35:48 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:35:48 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:35:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:35:48 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:35:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:35:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:35:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:80

. 2018.03.15 20:35:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:35:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.0.1,route-gateway 10.6.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.0.27 255.255.0.0,peer-id 0,cipher AES-256-GCM'

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.15 20:35:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:35:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:35:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:35:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:35:50 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:35:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:35:50 - OpenVPN > open_tun

. 2018.03.15 20:35:50 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:35:50 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:35:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.0.0/10.6.0.27/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:35:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.0.27/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.6.255.254, lease-time: 31536000]

. 2018.03.15 20:35:50 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:35:50 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:35:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:35:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:35:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:35:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:35:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.1

. 2018.03.15 20:35:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:35:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:35:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.1

. 2018.03.15 20:35:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:35:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:35:55 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:35:55 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:35:55 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:35:55 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.6.0.1) to 10.6.0.1)

. 2018.03.15 20:35:55 - Flushing DNS

I 2018.03.15 20:35:58 - Checking route

I 2018.03.15 20:35:58 - Checking DNS

! 2018.03.15 20:36:11 - Connected.

. 2018.03.15 20:36:11 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:37:03 - Disconnecting

. 2018.03.15 20:37:03 - Sending management termination signal

. 2018.03.15 20:37:03 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:37:08 - Connection terminated.

. 2018.03.15 20:37:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:37:08 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:37:08 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:37:08 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:37:08 - Checking authorization ...

! 2018.03.15 20:37:08 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:37:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:37:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:37:08 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:37:08 - Connection to OpenVPN Management Interface

. 2018.03.15 20:37:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:37:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:37:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:37:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:443

. 2018.03.15 20:37:08 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:37:08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]80.84.49.4:443 [nonblock]

. 2018.03.15 20:37:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:37:09 - OpenVPN > TCP connection established with [AF_INET]80.84.49.4:443

. 2018.03.15 20:37:09 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2018.03.15 20:37:09 - OpenVPN > TCP_CLIENT link remote: [AF_INET]80.84.49.4:443

. 2018.03.15 20:37:09 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=7c5f6b35 76bfd095

. 2018.03.15 20:37:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:37:09 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:37:09 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:37:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:37:09 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:37:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:37:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:37:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443

. 2018.03.15 20:37:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:37:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.4 255.255.0.0,peer-id 0,cipher AES-256-GCM'

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627

. 2018.03.15 20:37:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:37:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:37:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:37:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:37:11 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:37:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:37:11 - OpenVPN > open_tun

. 2018.03.15 20:37:11 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:37:11 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:37:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.4/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:37:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.4/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.5.255.254, lease-time: 31536000]

. 2018.03.15 20:37:11 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:37:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:37:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:37:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:37:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:37:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:37:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2018.03.15 20:37:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:37:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:37:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2018.03.15 20:37:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:37:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:37:15 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:37:15 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:37:15 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:37:15 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.5.0.1) to 10.5.0.1)

. 2018.03.15 20:37:15 - Flushing DNS

I 2018.03.15 20:37:18 - Checking route

I 2018.03.15 20:37:18 - Checking DNS

! 2018.03.15 20:37:31 - Connected.

. 2018.03.15 20:37:31 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:46:44 - Disconnecting

. 2018.03.15 20:46:44 - Sending management termination signal

. 2018.03.15 20:46:44 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:46:44 - Connection terminated.

. 2018.03.15 20:46:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:46:44 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:46:44 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:46:44 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:46:44 - Checking authorization ...

! 2018.03.15 20:46:45 - Connecting to Alshain (United Kingdom, London)

. 2018.03.15 20:46:45 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:46:45 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:46:45 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:46:45 - Connection to OpenVPN Management Interface

. 2018.03.15 20:46:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:46:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:46:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:46:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.151.98.162:443

. 2018.03.15 20:46:45 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:46:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]217.151.98.162:443 [nonblock]

. 2018.03.15 20:46:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:46:46 - OpenVPN > TCP connection established with [AF_INET]217.151.98.162:443

. 2018.03.15 20:46:46 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2018.03.15 20:46:46 - OpenVPN > TCP_CLIENT link remote: [AF_INET]217.151.98.162:443

. 2018.03.15 20:46:46 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.162:443, sid=b77641ce 4b1e416d

. 2018.03.15 20:46:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:46:46 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:46:46 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:46:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:46:46 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:46:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:46:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:46:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.162:443

. 2018.03.15 20:46:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:46:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.167 255.255.0.0'

. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:46:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:46:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.15 20:46:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:46:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.03.15 20:46:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:46:47 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:46:47 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:46:47 - OpenVPN > open_tun

. 2018.03.15 20:46:47 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:46:47 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:46:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.167/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:46:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.167/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.5.255.254, lease-time: 31536000]

. 2018.03.15 20:46:47 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:46:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:46:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:46:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 217.151.98.162 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:46:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:46:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:46:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2018.03.15 20:46:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:46:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:46:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2018.03.15 20:46:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:46:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:46:53 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:46:53 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:46:53 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:46:53 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.5.0.1) to 10.5.0.1)

. 2018.03.15 20:46:53 - Flushing DNS

I 2018.03.15 20:46:56 - Checking route

I 2018.03.15 20:46:56 - Checking DNS

! 2018.03.15 20:47:10 - Connected.

. 2018.03.15 20:47:10 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:51:22 - Disconnecting

. 2018.03.15 20:51:22 - Sending management termination signal

. 2018.03.15 20:51:22 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:51:22 - Connection terminated.

. 2018.03.15 20:51:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:51:22 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:51:22 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:51:22 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:51:22 - Checking authorization ...

! 2018.03.15 20:51:22 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:51:23 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:51:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:51:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:51:23 - Connection to OpenVPN Management Interface

. 2018.03.15 20:51:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:51:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:51:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:51:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:443

. 2018.03.15 20:51:23 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:51:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]80.84.49.4:443 [nonblock]

. 2018.03.15 20:51:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:51:24 - OpenVPN > TCP connection established with [AF_INET]80.84.49.4:443

. 2018.03.15 20:51:24 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2018.03.15 20:51:24 - OpenVPN > TCP_CLIENT link remote: [AF_INET]80.84.49.4:443

. 2018.03.15 20:51:24 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=543b4588 0f790cd7

. 2018.03.15 20:51:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:51:24 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:51:24 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:51:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:51:24 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:51:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:51:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:51:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443

. 2018.03.15 20:51:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:51:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.4 255.255.0.0,peer-id 0,cipher AES-256-GCM'

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627

. 2018.03.15 20:51:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:51:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:51:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:51:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:51:25 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:51:25 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:51:25 - OpenVPN > open_tun

. 2018.03.15 20:51:25 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:51:25 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:51:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.4/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:51:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.4/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.5.255.254, lease-time: 31536000]

. 2018.03.15 20:51:25 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:51:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:51:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:51:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:51:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:51:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:51:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2018.03.15 20:51:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:51:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:51:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1

. 2018.03.15 20:51:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:51:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:51:30 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:51:30 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:51:30 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:51:30 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.5.0.1) to 10.5.0.1)

. 2018.03.15 20:51:30 - Flushing DNS

I 2018.03.15 20:51:33 - Checking route

I 2018.03.15 20:51:34 - Checking DNS

! 2018.03.15 20:51:46 - Connected.

. 2018.03.15 20:51:46 - OpenVPN > Initialization Sequence Completed

! 2018.03.15 20:55:31 - Disconnecting

. 2018.03.15 20:55:31 - Sending management termination signal

. 2018.03.15 20:55:31 - Management - Send 'signal SIGTERM'

. 2018.03.15 20:55:31 - Connection terminated.

. 2018.03.15 20:55:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)

. 2018.03.15 20:55:31 - DNS leak protection with packet filtering disabled.

. 2018.03.15 20:55:31 - Interface Airvpn metric restored from 3 to 5, layer IPv4

. 2018.03.15 20:55:31 - Interface Airvpn metric restored from 3 to Automatic, layer IPv6

I 2018.03.15 20:55:31 - Checking authorization ...

! 2018.03.15 20:55:32 - Connecting to Algedi (United Kingdom, London)

. 2018.03.15 20:55:32 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017

. 2018.03.15 20:55:32 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit

. 2018.03.15 20:55:32 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.03.15 20:55:32 - Connection to OpenVPN Management Interface

. 2018.03.15 20:55:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.03.15 20:55:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:55:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.03.15 20:55:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:53

. 2018.03.15 20:55:32 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]

. 2018.03.15 20:55:32 - OpenVPN > UDP link local: (not bound)

. 2018.03.15 20:55:32 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:53

. 2018.03.15 20:55:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.03.15 20:55:32 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:53, sid=9673f792 c00b7a45

. 2018.03.15 20:55:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.03.15 20:55:32 - OpenVPN > VERIFY KU OK

. 2018.03.15 20:55:32 - OpenVPN > Validating certificate extended key usage

. 2018.03.15 20:55:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.03.15 20:55:32 - OpenVPN > VERIFY EKU OK

. 2018.03.15 20:55:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.03.15 20:55:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.03.15 20:55:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:53

. 2018.03.15 20:55:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.03.15 20:55:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.26 255.255.0.0,peer-id 1,cipher AES-256-GCM'

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: route options modified

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.03.15 20:55:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.03.15 20:55:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.03.15 20:55:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:55:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.03.15 20:55:33 - OpenVPN > interactive service msg_channel=0

. 2018.03.15 20:55:33 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=60:a4:4c:40:da:48

. 2018.03.15 20:55:33 - OpenVPN > open_tun

. 2018.03.15 20:55:33 - OpenVPN > TAP-WIN32 device [Airvpn] opened: \\.\Global\{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}.tap

. 2018.03.15 20:55:33 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.03.15 20:55:33 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.26/255.255.0.0 [sUCCEEDED]

. 2018.03.15 20:55:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.26/255.255.0.0 on interface {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA} [DHCP-serv: 10.8.255.254, lease-time: 31536000]

. 2018.03.15 20:55:33 - OpenVPN > Successful ARP Flush on interface [5] {2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}

. 2018.03.15 20:55:33 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.03.15 20:55:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.03.15 20:55:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1

. 2018.03.15 20:55:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2018.03.15 20:55:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:55:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.03.15 20:55:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:55:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:55:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.03.15 20:55:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4

. 2018.03.15 20:55:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.03.15 20:55:39 - Interface Airvpn metric changed from 5 to 3, layer IPv4

. 2018.03.15 20:55:39 - Interface Airvpn metric changed from Automatic to 3, layer IPv6

. 2018.03.15 20:55:39 - DNS leak protection with packet filtering enabled.

. 2018.03.15 20:55:39 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.8.0.1) to 10.8.0.1)

. 2018.03.15 20:55:39 - Flushing DNS

I 2018.03.15 20:55:42 - Checking route

I 2018.03.15 20:55:42 - Checking DNS

! 2018.03.15 20:55:54 - Connected.

. 2018.03.15 20:55:54 - OpenVPN > Initialization Sequence Completed

 

----------------------------

Network Interfaces:

 

Network Interface: Airvpn (TAP-Windows Adapter V9, ID:{2AF914A8-74C8-4B7B-B9DF-22D341BC9EEA}) - Ethernet - Up

Network Interface: Ethernet (Intel® 82579V Gigabit Network Connection, ID:{6D5E91B7-53DC-4AB8-9DFA-868EF8060C5D}) - Ethernet - Up

Network Interface: WiFi (Qualcomm Atheros AR9485 Wireless Network Adapter, ID:{D294068B-C945-49FF-8150-01451E7BBA4A}) - Wireless80211 - Down

Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{2881360B-773D-4BD0-9441-D968DB321622}) - Wireless80211 - Down

Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{3B91D51F-CF81-11E7-BED8-806E6F6E6963}) - Loopback - Up

 

----------------------------

Default gateways:

 

192.168.0.1, Intel® 82579V Gigabit Network Connection

 

----------------------------

ipconfig /all:

 

Windows IP Configuration

 

   Host Name . . . . . . . . . . . . : DESKTOP-2ESTVBJ

   Primary Dns Suffix  . . . . . . . : 

   Node Type . . . . . . . . . . . . : Hybrid

   IP Routing Enabled. . . . . . . . : No

   WINS Proxy Enabled. . . . . . . . : No

 

Ethernet adapter Airvpn:

 

   Connection-specific DNS Suffix  . : 

   Description . . . . . . . . . . . : TAP-Windows Adapter V9

   Physical Address. . . . . . . . . : 00-FF-2A-F9-14-A8

   DHCP Enabled. . . . . . . . . . . : Yes

   Autoconfiguration Enabled . . . . : Yes

   Link-local IPv6 Address . . . . . : fe80::dc3:1b2f:eec6:b0bf%5(Preferred) 

   IPv4 Address. . . . . . . . . . . : 10.8.0.26(Preferred) 

   Subnet Mask . . . . . . . . . . . : 255.255.0.0

   Lease Obtained. . . . . . . . . . : 15 March 2018 20:55:33

   Lease Expires . . . . . . . . . . : 15 March 2019 20:55:33

   Default Gateway . . . . . . . . . : 

   DHCP Server . . . . . . . . . . . : 10.8.255.254

   DHCPv6 IAID . . . . . . . . . . . : 167837482

   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-A7-27-67-60-A4-4C-40-DA-48

   DNS Servers . . . . . . . . . . . : 10.8.0.1

   NetBIOS over Tcpip. . . . . . . . : Disabled

 

Ethernet adapter Ethernet:

 

   Connection-specific DNS Suffix  . : 

   Description . . . . . . . . . . . : Intel® 82579V Gigabit Network Connection

   Physical Address. . . . . . . . . : 60-A4-4C-40-DA-48

   DHCP Enabled. . . . . . . . . . . : Yes

   Autoconfiguration Enabled . . . . : Yes

   Link-local IPv6 Address . . . . . : fe80::2976:3ba6:ca1c:bb6d%8(Preferred) 

   IPv4 Address. . . . . . . . . . . : 192.168.0.24(Preferred) 

   Subnet Mask . . . . . . . . . . . : 255.255.255.0

   Lease Obtained. . . . . . . . . . : 15 March 2018 20:26:00

   Lease Expires . . . . . . . . . . : 25 March 2018 19:25:59

   Default Gateway . . . . . . . . . : 192.168.0.1

   DHCP Server . . . . . . . . . . . : 192.168.0.1

   DHCPv6 IAID . . . . . . . . . . . : 73442380

   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-A7-27-67-60-A4-4C-40-DA-48

   DNS Servers . . . . . . . . . . . : 194.168.4.100

                                       194.168.8.100

   NetBIOS over Tcpip. . . . . . . . : Enabled

 

Wireless LAN adapter WiFi:

 

   Media State . . . . . . . . . . . : Media disconnected

   Connection-specific DNS Suffix  . : 

   Description . . . . . . . . . . . : Qualcomm Atheros AR9485 Wireless Network Adapter

   Physical Address. . . . . . . . . : 6C-71-D9-59-CB-DC

   DHCP Enabled. . . . . . . . . . . : Yes

   Autoconfiguration Enabled . . . . : Yes

 

Wireless LAN adapter Local Area Connection* 1:

 

   Media State . . . . . . . . . . . : Media disconnected

   Connection-specific DNS Suffix  . : 

   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter

   Physical Address. . . . . . . . . : 1E-71-D9-59-CB-DC

   DHCP Enabled. . . . . . . . . . . : Yes

   Autoconfiguration Enabled . . . . : Yes

----------------------------

route print:

 

===========================================================================

Interface List

  5...00 ff 2a f9 14 a8 ......TAP-Windows Adapter V9

  8...60 a4 4c 40 da 48 ......Intel® 82579V Gigabit Network Connection

 13...6c 71 d9 59 cb dc ......Qualcomm Atheros AR9485 Wireless Network Adapter

  4...1e 71 d9 59 cb dc ......Microsoft Wi-Fi Direct Virtual Adapter

  1...........................Software Loopback Interface 1

===========================================================================

 

IPv4 Route Table

===========================================================================

Active Routes:

Network Destination        Netmask          Gateway       Interface  Metric

          0.0.0.0          0.0.0.0      192.168.0.1     192.168.0.24     25

          0.0.0.0        128.0.0.0         10.8.0.1        10.8.0.26      3

         10.8.0.0      255.255.0.0         On-link         10.8.0.26    259

        10.8.0.26  255.255.255.255         On-link         10.8.0.26    259

     10.8.255.255  255.255.255.255         On-link         10.8.0.26    259

       80.84.49.4  255.255.255.255      192.168.0.1     192.168.0.24     25

        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331

        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331

  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331

        128.0.0.0        128.0.0.0         10.8.0.1        10.8.0.26      3

      192.168.0.0    255.255.255.0         On-link      192.168.0.24    281

     192.168.0.24  255.255.255.255         On-link      192.168.0.24    281

    192.168.0.255  255.255.255.255         On-link      192.168.0.24    281

        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331

        224.0.0.0        240.0.0.0         On-link         10.8.0.26    259

        224.0.0.0        240.0.0.0         On-link      192.168.0.24    281

  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331

  255.255.255.255  255.255.255.255         On-link         10.8.0.26    259

  255.255.255.255  255.255.255.255         On-link      192.168.0.24    281

===========================================================================

Persistent Routes:

  None

 

IPv6 Route Table

===========================================================================

Active Routes:

 If Metric Network Destination      Gateway

  1    331 ::1/128                  On-link

  5    259 fe80::/64                On-link

  8    281 fe80::/64                On-link

  5    259 fe80::dc3:1b2f:eec6:b0bf/128

                                    On-link

  8    281 fe80::2976:3ba6:ca1c:bb6d/128

                                    On-link

  1    331 ff00::/8                 On-link

  5    259 ff00::/8                 On-link

  8    281 ff00::/8                 On-link

===========================================================================

Persistent Routes:

  None

Share this post


Link to post

Hello!

 

Please make sure that no QoS / packet filtering tools, both on your router and system, interfere with traffic, and also test (with the connection mode that could provide you with the highest throughput) different servers in various locations around you (prefer servers with lowest round trip time).

 

We don't see any bad packet / packet error in the log entries, so we tend to rule out MTU size problems.

 

Some users reported in the past interesting performance boost (in Windows) after having fine tuned the TCP/IP stack with TCPOptimizer. If all else fails, you could give it a try, please see here:

https://airvpn.org/topic/24126-tcp-optimizer-for-windows

 

It looks like that with some TCP/IP stack optimization Windows can partially fill the gap with the other systems in the tun/tap interface "performance". It is not easy in Windows to match the throughput you get in the tun/tap interface when compared to other systems (you don't have fast-io, you don't have any native tun/tap support and some other problems due to bad architecture), but with TCP Optimizer and the latest tun/tap driver throughput can be improved (of course, it is assumed that your system has a powerful enough CPU).

 

120 Mbit/s is not bad anyway if you make a comparison with just 5-6 years ago, when beating 100 Mbit/s on the tun/tap interface with the old tun/tap driver in Windows was deemed as impossible.

 

Kind regards

Share this post


Link to post

Ok thank you,  I'll have a look to into it further.  

 

I mainly use speedtest.net  is there any other good speed test sites? 

 the AirVpn speed test link in the eddie app doesn't work for me.

 

Many thanks

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...