after_lunch 4 Posted ... I use Eddie with the option "Lock Current" server, because I am often running torrents in the background, or downloading from filehosts, etc.Usually, the connection is stable, and remains open, on the locked server, until I quit Eddie.Recently, Eddie has been disconnecting from the locked server, then immediately reconnecting, after a few hours of activity (sometimes longer, sometimes shorter).The log suggests it is due to inactivity timeout. Sometimes, I can recognise the possible "culprit", e.g. one download in the queue has finished, and there is a brief pause in activity before the next download begins. However, at 15:09 today, Eddie disconnected during an active torrent upload (log extract below). This morning, there was at least one disconnect during what should have been a continuous 7 hour, 5 file, upload to MEGA (log not available), and one file upload failed, although I can't be sure the disconnect caused the failure. (MEGA usually manages to resume interrupted uploads.) Grateful for any advice on how to avoid these inactivity timeouts.I 2018.05.29 13:56:16 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 8.1, Version: Microsoft Windows NT 6.3.9600.0, Mono/.Net Framework: v4.0.30319. 2018.05.29 13:56:16 - Reading options from C:\Users\Paul\AppData\Local\AirVPN\AirVPN.xml. 2018.05.29 13:56:18 - Command line arguments (1): path="home"I 2018.05.29 13:56:21 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.05.29 13:56:21 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.05.29 13:56:21 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.05.29 13:56:21 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.05.29 13:56:21 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.05.29 13:56:21 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem. 2018.05.29 13:56:21 - Updating systems & servers data ...! 2018.05.29 13:56:21 - Ready. 2018.05.29 13:56:22 - Systems & servers data update completed! 2018.05.29 13:56:25 - Activation of Network Lock - Windows Filtering PlatformI 2018.05.29 13:56:27 - Checking login ...! 2018.05.29 13:56:28 - Logged in.I 2018.05.29 13:56:34 - Session starting.. 2018.05.29 13:56:34 - IPv6 disabled with packet filtering.I 2018.05.29 13:56:34 - Checking authorization ...! 2018.05.29 13:56:35 - Connecting to Chow (United Kingdom, Manchester). 2018.05.29 13:56:35 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.29 13:56:35 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.29 13:56:35 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.29 13:56:35 - Connection to OpenVPN Management Interface. 2018.05.29 13:56:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.29 13:56:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.29 13:56:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.29 13:56:35 - OpenVPN > UDP link local: (not bound). 2018.05.29 13:56:35 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.29 13:56:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.29 13:56:35 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=e162e20a 51d49e77. 2018.05.29 13:56:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 13:56:35 - OpenVPN > VERIFY KU OK. 2018.05.29 13:56:35 - OpenVPN > Validating certificate extended key usage. 2018.05.29 13:56:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 13:56:35 - OpenVPN > VERIFY EKU OK. 2018.05.29 13:56:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 13:56:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 13:56:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.29 13:56:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.29 13:56:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.29 13:56:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 13:56:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 13:56:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:36 - OpenVPN > interactive service msg_channel=0. 2018.05.29 13:56:36 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=14:2d:27:7e:a3:6d. 2018.05.29 13:56:36 - OpenVPN > open_tun. 2018.05.29 13:56:37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0B0E39F4-4920-4D5F-9086-73C283DC9B52}.tap. 2018.05.29 13:56:37 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.29 13:56:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.29 13:56:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {0B0E39F4-4920-4D5F-9086-73C283DC9B52} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.29 13:56:37 - OpenVPN > Successful ARP Flush on interface [33] {0B0E39F4-4920-4D5F-9086-73C283DC9B52}. 2018.05.29 13:56:37 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.29 13:56:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.29 13:56:41 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.29 13:56:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.29 13:56:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 13:56:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 13:56:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 13:56:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 13:56:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 13:56:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 13:56:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 13:56:41 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.29 13:56:41 - DNS leak protection with packet filtering enabled.. 2018.05.29 13:56:41 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.29 13:56:41 - Flushing DNSI 2018.05.29 13:56:45 - Checking routeI 2018.05.29 13:56:48 - Checking DNS! 2018.05.29 13:57:01 - Connected.. 2018.05.29 13:57:01 - OpenVPN > Initialization Sequence Completed. 2018.05.29 14:07:19 - Updating systems & servers data .... 2018.05.29 14:07:20 - Systems & servers data update completed. 2018.05.29 14:18:14 - Updating systems & servers data .... 2018.05.29 14:18:15 - Systems & servers data update completed. 2018.05.29 14:29:11 - Updating systems & servers data .... 2018.05.29 14:29:12 - Systems & servers data update completed. 2018.05.29 14:40:08 - Updating systems & servers data .... 2018.05.29 14:40:09 - Systems & servers data update completed. 2018.05.29 14:51:04 - Updating systems & servers data .... 2018.05.29 14:51:05 - Systems & servers data update completed. 2018.05.29 14:56:35 - OpenVPN > TLS: soft reset sec=0 bytes=1027122257/-1 pkts=1318812/0. 2018.05.29 14:56:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 14:56:35 - OpenVPN > VERIFY KU OK. 2018.05.29 14:56:35 - OpenVPN > Validating certificate extended key usage. 2018.05.29 14:56:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 14:56:35 - OpenVPN > VERIFY EKU OK. 2018.05.29 14:56:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 14:56:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 14:56:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 14:56:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 14:56:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 14:56:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 15:01:57 - Updating systems & servers data .... 2018.05.29 15:01:58 - Systems & servers data update completed. 2018.05.29 15:09:00 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.29 15:09:00 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.29 15:09:00 - OpenVPN > Restart pause, 5 second(s)! 2018.05.29 15:09:00 - Disconnecting. 2018.05.29 15:09:00 - Sending management termination signal. 2018.05.29 15:09:00 - Management - Send 'signal SIGTERM'. 2018.05.29 15:09:00 - Connection terminated.. 2018.05.29 15:09:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.29 15:09:00 - DNS leak protection with packet filtering disabled.. 2018.05.29 15:09:00 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4I 2018.05.29 15:09:07 - Checking authorization ...! 2018.05.29 15:09:08 - Connecting to Chow (United Kingdom, Manchester). 2018.05.29 15:09:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.29 15:09:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.29 15:09:08 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.29 15:09:08 - Connection to OpenVPN Management Interface. 2018.05.29 15:09:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.29 15:09:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.29 15:09:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.29 15:09:08 - OpenVPN > UDP link local: (not bound). 2018.05.29 15:09:08 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.29 15:09:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.29 15:09:08 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=897c214b 50750a0f. 2018.05.29 15:09:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 15:09:08 - OpenVPN > VERIFY KU OK. 2018.05.29 15:09:08 - OpenVPN > Validating certificate extended key usage. 2018.05.29 15:09:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 15:09:08 - OpenVPN > VERIFY EKU OK. 2018.05.29 15:09:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 15:09:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 15:09:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.29 15:09:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.29 15:09:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.29 15:09:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 15:09:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 15:09:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:10 - OpenVPN > interactive service msg_channel=0. 2018.05.29 15:09:10 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=14:2d:27:7e:a3:6d. 2018.05.29 15:09:10 - OpenVPN > open_tun. 2018.05.29 15:09:10 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0B0E39F4-4920-4D5F-9086-73C283DC9B52}.tap. 2018.05.29 15:09:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.29 15:09:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.29 15:09:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {0B0E39F4-4920-4D5F-9086-73C283DC9B52} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.29 15:09:10 - OpenVPN > Successful ARP Flush on interface [33] {0B0E39F4-4920-4D5F-9086-73C283DC9B52}. 2018.05.29 15:09:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.29 15:09:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.29 15:09:16 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.29 15:09:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.29 15:09:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 15:09:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 15:09:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 15:09:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 15:09:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 15:09:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 15:09:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 15:09:16 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.29 15:09:16 - DNS leak protection with packet filtering enabled.. 2018.05.29 15:09:16 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.29 15:09:16 - Flushing DNSI 2018.05.29 15:09:19 - Checking routeI 2018.05.29 15:09:19 - Checking DNS! 2018.05.29 15:09:32 - Connected.. 2018.05.29 15:09:32 - OpenVPN > Initialization Sequence Completed. 2018.05.29 15:12:54 - Updating systems & servers data .... 2018.05.29 15:12:55 - Systems & servers data update completed. 2018.05.29 15:23:51 - Updating systems & servers data .... 2018.05.29 15:23:52 - Systems & servers data update completed. 2018.05.29 15:34:49 - Updating systems & servers data .... 2018.05.29 15:34:50 - Systems & servers data update completed. 2018.05.29 15:45:47 - Updating systems & servers data .... 2018.05.29 15:45:47 - Systems & servers data update completed Quote Share this post Link to post
go558a83nk 364 Posted ... That sort of inactivity is not what causes disconnects. Something is causing the tunnel to not be able to send/receive data at all. Quote Share this post Link to post
after_lunch 4 Posted ... It happened twice more during the previous session (new log details below), at 16:47 and 17:17. I don't know what might have caused the 16:47 disconnect, but 17:17 was when I stopped all torrents in progress prior to quitting uTorrent. I suppose I should be grateful that these disconnects, whatever their cause, only last a few seconds. I always get a strong wifi signal - 4 or 5 bars - and I've now reset my router and run the Microsoft troubleshooter, which claims to have found and fixed a network adapter problem! I'll wait and see what happens.I 2018.05.29 13:56:16 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 8.1, Version: Microsoft Windows NT 6.3.9600.0, Mono/.Net Framework: v4.0.30319. 2018.05.29 13:56:16 - Reading options from C:\Users\Paul\AppData\Local\AirVPN\AirVPN.xml. 2018.05.29 13:56:18 - Command line arguments (1): path="home"I 2018.05.29 13:56:21 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.05.29 13:56:21 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.05.29 13:56:21 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.05.29 13:56:21 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.05.29 13:56:21 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.05.29 13:56:21 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem. 2018.05.29 13:56:21 - Updating systems & servers data ...! 2018.05.29 13:56:21 - Ready. 2018.05.29 13:56:22 - Systems & servers data update completed! 2018.05.29 13:56:25 - Activation of Network Lock - Windows Filtering PlatformI 2018.05.29 13:56:27 - Checking login ...! 2018.05.29 13:56:28 - Logged in.I 2018.05.29 13:56:34 - Session starting.. 2018.05.29 13:56:34 - IPv6 disabled with packet filtering.I 2018.05.29 13:56:34 - Checking authorization ...! 2018.05.29 13:56:35 - Connecting to Chow (United Kingdom, Manchester). 2018.05.29 13:56:35 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.29 13:56:35 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.29 13:56:35 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.29 13:56:35 - Connection to OpenVPN Management Interface. 2018.05.29 13:56:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.29 13:56:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.29 13:56:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.29 13:56:35 - OpenVPN > UDP link local: (not bound). 2018.05.29 13:56:35 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.29 13:56:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.29 13:56:35 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=e162e20a 51d49e77. 2018.05.29 13:56:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 13:56:35 - OpenVPN > VERIFY KU OK. 2018.05.29 13:56:35 - OpenVPN > Validating certificate extended key usage. 2018.05.29 13:56:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 13:56:35 - OpenVPN > VERIFY EKU OK. 2018.05.29 13:56:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 13:56:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 13:56:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.29 13:56:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.29 13:56:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.29 13:56:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.29 13:56:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 13:56:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 13:56:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 13:56:36 - OpenVPN > interactive service msg_channel=0. 2018.05.29 13:56:36 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=14:2d:27:7e:a3:6d. 2018.05.29 13:56:36 - OpenVPN > open_tun. 2018.05.29 13:56:37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0B0E39F4-4920-4D5F-9086-73C283DC9B52}.tap. 2018.05.29 13:56:37 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.29 13:56:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.29 13:56:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {0B0E39F4-4920-4D5F-9086-73C283DC9B52} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.29 13:56:37 - OpenVPN > Successful ARP Flush on interface [33] {0B0E39F4-4920-4D5F-9086-73C283DC9B52}. 2018.05.29 13:56:37 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.29 13:56:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.29 13:56:41 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.29 13:56:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.29 13:56:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 13:56:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 13:56:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 13:56:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 13:56:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 13:56:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 13:56:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 13:56:41 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.29 13:56:41 - DNS leak protection with packet filtering enabled.. 2018.05.29 13:56:41 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.29 13:56:41 - Flushing DNSI 2018.05.29 13:56:45 - Checking routeI 2018.05.29 13:56:48 - Checking DNS! 2018.05.29 13:57:01 - Connected.. 2018.05.29 13:57:01 - OpenVPN > Initialization Sequence Completed. 2018.05.29 14:07:19 - Updating systems & servers data .... 2018.05.29 14:07:20 - Systems & servers data update completed. 2018.05.29 14:18:14 - Updating systems & servers data .... 2018.05.29 14:18:15 - Systems & servers data update completed. 2018.05.29 14:29:11 - Updating systems & servers data .... 2018.05.29 14:29:12 - Systems & servers data update completed. 2018.05.29 14:40:08 - Updating systems & servers data .... 2018.05.29 14:40:09 - Systems & servers data update completed. 2018.05.29 14:51:04 - Updating systems & servers data .... 2018.05.29 14:51:05 - Systems & servers data update completed. 2018.05.29 14:56:35 - OpenVPN > TLS: soft reset sec=0 bytes=1027122257/-1 pkts=1318812/0. 2018.05.29 14:56:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 14:56:35 - OpenVPN > VERIFY KU OK. 2018.05.29 14:56:35 - OpenVPN > Validating certificate extended key usage. 2018.05.29 14:56:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 14:56:35 - OpenVPN > VERIFY EKU OK. 2018.05.29 14:56:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 14:56:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 14:56:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 14:56:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 14:56:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 14:56:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 15:01:57 - Updating systems & servers data .... 2018.05.29 15:01:58 - Systems & servers data update completed. 2018.05.29 15:09:00 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.29 15:09:00 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.29 15:09:00 - OpenVPN > Restart pause, 5 second(s)! 2018.05.29 15:09:00 - Disconnecting. 2018.05.29 15:09:00 - Sending management termination signal. 2018.05.29 15:09:00 - Management - Send 'signal SIGTERM'. 2018.05.29 15:09:00 - Connection terminated.. 2018.05.29 15:09:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.29 15:09:00 - DNS leak protection with packet filtering disabled.. 2018.05.29 15:09:00 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4I 2018.05.29 15:09:07 - Checking authorization ...! 2018.05.29 15:09:08 - Connecting to Chow (United Kingdom, Manchester). 2018.05.29 15:09:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.29 15:09:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.29 15:09:08 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.29 15:09:08 - Connection to OpenVPN Management Interface. 2018.05.29 15:09:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.29 15:09:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.29 15:09:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.29 15:09:08 - OpenVPN > UDP link local: (not bound). 2018.05.29 15:09:08 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.29 15:09:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.29 15:09:08 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=897c214b 50750a0f. 2018.05.29 15:09:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 15:09:08 - OpenVPN > VERIFY KU OK. 2018.05.29 15:09:08 - OpenVPN > Validating certificate extended key usage. 2018.05.29 15:09:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 15:09:08 - OpenVPN > VERIFY EKU OK. 2018.05.29 15:09:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 15:09:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 15:09:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.29 15:09:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.29 15:09:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.29 15:09:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.29 15:09:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 15:09:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 15:09:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 15:09:10 - OpenVPN > interactive service msg_channel=0. 2018.05.29 15:09:10 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=14:2d:27:7e:a3:6d. 2018.05.29 15:09:10 - OpenVPN > open_tun. 2018.05.29 15:09:10 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0B0E39F4-4920-4D5F-9086-73C283DC9B52}.tap. 2018.05.29 15:09:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.29 15:09:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.29 15:09:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {0B0E39F4-4920-4D5F-9086-73C283DC9B52} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.29 15:09:10 - OpenVPN > Successful ARP Flush on interface [33] {0B0E39F4-4920-4D5F-9086-73C283DC9B52}. 2018.05.29 15:09:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.29 15:09:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.29 15:09:16 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.29 15:09:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.29 15:09:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 15:09:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 15:09:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 15:09:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 15:09:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 15:09:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 15:09:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 15:09:16 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.29 15:09:16 - DNS leak protection with packet filtering enabled.. 2018.05.29 15:09:16 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.29 15:09:16 - Flushing DNSI 2018.05.29 15:09:19 - Checking routeI 2018.05.29 15:09:19 - Checking DNS! 2018.05.29 15:09:32 - Connected.. 2018.05.29 15:09:32 - OpenVPN > Initialization Sequence Completed. 2018.05.29 15:12:54 - Updating systems & servers data .... 2018.05.29 15:12:55 - Systems & servers data update completed. 2018.05.29 15:23:51 - Updating systems & servers data .... 2018.05.29 15:23:52 - Systems & servers data update completed. 2018.05.29 15:34:49 - Updating systems & servers data .... 2018.05.29 15:34:50 - Systems & servers data update completed. 2018.05.29 15:45:47 - Updating systems & servers data .... 2018.05.29 15:45:47 - Systems & servers data update completed. 2018.05.29 15:56:44 - Updating systems & servers data .... 2018.05.29 15:56:45 - Systems & servers data update completed. 2018.05.29 16:07:40 - Updating systems & servers data .... 2018.05.29 16:07:41 - Systems & servers data update completed. 2018.05.29 16:09:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 16:09:08 - OpenVPN > VERIFY KU OK. 2018.05.29 16:09:08 - OpenVPN > Validating certificate extended key usage. 2018.05.29 16:09:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 16:09:08 - OpenVPN > VERIFY EKU OK. 2018.05.29 16:09:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 16:09:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 16:09:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:09:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 16:09:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:09:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 16:18:35 - Updating systems & servers data .... 2018.05.29 16:18:36 - Systems & servers data update completed. 2018.05.29 16:29:28 - Updating systems & servers data .... 2018.05.29 16:29:29 - Systems & servers data update completed. 2018.05.29 16:40:25 - Updating systems & servers data .... 2018.05.29 16:40:26 - Systems & servers data update completed. 2018.05.29 16:47:45 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.29 16:47:45 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.29 16:47:45 - OpenVPN > Restart pause, 5 second(s)! 2018.05.29 16:47:45 - Disconnecting. 2018.05.29 16:47:45 - Sending management termination signal. 2018.05.29 16:47:45 - Management - Send 'signal SIGTERM'. 2018.05.29 16:47:45 - Connection terminated.. 2018.05.29 16:47:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.29 16:47:45 - DNS leak protection with packet filtering disabled.. 2018.05.29 16:47:45 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4I 2018.05.29 16:47:49 - Checking authorization ...! 2018.05.29 16:47:50 - Connecting to Chow (United Kingdom, Manchester). 2018.05.29 16:47:50 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.29 16:47:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.29 16:47:50 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.29 16:47:50 - Connection to OpenVPN Management Interface. 2018.05.29 16:47:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.29 16:47:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:47:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:47:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.29 16:47:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.29 16:47:50 - OpenVPN > UDP link local: (not bound). 2018.05.29 16:47:50 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.29 16:47:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.29 16:47:50 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=a2f69071 2d34d1ef. 2018.05.29 16:47:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 16:47:50 - OpenVPN > VERIFY KU OK. 2018.05.29 16:47:50 - OpenVPN > Validating certificate extended key usage. 2018.05.29 16:47:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 16:47:50 - OpenVPN > VERIFY EKU OK. 2018.05.29 16:47:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 16:47:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 16:47:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.29 16:47:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.29 16:47:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.29 16:47:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.29 16:47:52 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.29 16:47:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.29 16:47:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.29 16:47:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.29 16:47:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.29 16:47:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 16:47:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:47:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 16:47:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:47:52 - OpenVPN > interactive service msg_channel=0. 2018.05.29 16:47:52 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=14:2d:27:7e:a3:6d. 2018.05.29 16:47:52 - OpenVPN > open_tun. 2018.05.29 16:47:52 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0B0E39F4-4920-4D5F-9086-73C283DC9B52}.tap. 2018.05.29 16:47:52 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.29 16:47:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.29 16:47:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {0B0E39F4-4920-4D5F-9086-73C283DC9B52} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.29 16:47:52 - OpenVPN > Successful ARP Flush on interface [33] {0B0E39F4-4920-4D5F-9086-73C283DC9B52}. 2018.05.29 16:47:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.29 16:47:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.29 16:47:57 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.29 16:47:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.29 16:47:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 16:47:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 16:47:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 16:47:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 16:47:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 16:47:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 16:47:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 16:47:57 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.29 16:47:57 - DNS leak protection with packet filtering enabled.. 2018.05.29 16:47:57 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.29 16:47:57 - Flushing DNSI 2018.05.29 16:48:00 - Checking routeI 2018.05.29 16:48:01 - Checking DNS! 2018.05.29 16:48:17 - Connected.. 2018.05.29 16:48:17 - OpenVPN > Initialization Sequence Completed. 2018.05.29 16:51:23 - Updating systems & servers data .... 2018.05.29 16:51:23 - Systems & servers data update completed. 2018.05.29 16:58:01 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.29 16:58:01 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.29 16:58:01 - OpenVPN > Restart pause, 5 second(s)! 2018.05.29 16:58:01 - Disconnecting. 2018.05.29 16:58:01 - Sending management termination signal. 2018.05.29 16:58:01 - Management - Send 'signal SIGTERM'. 2018.05.29 16:58:01 - Connection terminated.. 2018.05.29 16:58:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.29 16:58:01 - DNS leak protection with packet filtering disabled.. 2018.05.29 16:58:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4I 2018.05.29 16:58:04 - Checking authorization ...! 2018.05.29 16:58:05 - Connecting to Chow (United Kingdom, Manchester). 2018.05.29 16:58:05 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.29 16:58:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.29 16:58:05 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.29 16:58:05 - Connection to OpenVPN Management Interface. 2018.05.29 16:58:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.29 16:58:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:58:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:58:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.29 16:58:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.29 16:58:05 - OpenVPN > UDP link local: (not bound). 2018.05.29 16:58:05 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.29 16:58:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.29 16:58:05 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=314bebbc df3b8696. 2018.05.29 16:58:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 16:58:05 - OpenVPN > VERIFY KU OK. 2018.05.29 16:58:05 - OpenVPN > Validating certificate extended key usage. 2018.05.29 16:58:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 16:58:05 - OpenVPN > VERIFY EKU OK. 2018.05.29 16:58:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 16:58:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 16:58:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.29 16:58:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.29 16:58:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.29 16:58:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.29 16:58:06 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.29 16:58:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.29 16:58:06 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.29 16:58:06 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.29 16:58:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.29 16:58:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 16:58:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:58:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 16:58:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 16:58:06 - OpenVPN > interactive service msg_channel=0. 2018.05.29 16:58:06 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=14:2d:27:7e:a3:6d. 2018.05.29 16:58:06 - OpenVPN > open_tun. 2018.05.29 16:58:06 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0B0E39F4-4920-4D5F-9086-73C283DC9B52}.tap. 2018.05.29 16:58:06 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.29 16:58:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.29 16:58:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {0B0E39F4-4920-4D5F-9086-73C283DC9B52} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.29 16:58:06 - OpenVPN > Successful ARP Flush on interface [33] {0B0E39F4-4920-4D5F-9086-73C283DC9B52}. 2018.05.29 16:58:06 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.29 16:58:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.29 16:58:11 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.29 16:58:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.29 16:58:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 16:58:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 16:58:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 16:58:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 16:58:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 16:58:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 16:58:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 16:58:11 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.29 16:58:11 - DNS leak protection with packet filtering enabled.. 2018.05.29 16:58:11 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.29 16:58:11 - Flushing DNSI 2018.05.29 16:58:15 - Checking routeI 2018.05.29 16:58:15 - Checking DNS! 2018.05.29 16:58:27 - Connected.. 2018.05.29 16:58:27 - OpenVPN > Initialization Sequence Completed. 2018.05.29 17:02:20 - Updating systems & servers data .... 2018.05.29 17:02:21 - Systems & servers data update completed. 2018.05.29 17:13:17 - Updating systems & servers data .... 2018.05.29 17:13:18 - Systems & servers data update completed. 2018.05.29 17:17:26 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.29 17:17:26 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.29 17:17:26 - OpenVPN > Restart pause, 5 second(s)! 2018.05.29 17:17:26 - Disconnecting. 2018.05.29 17:17:26 - Sending management termination signal. 2018.05.29 17:17:26 - Management - Send 'signal SIGTERM'. 2018.05.29 17:17:27 - Connection terminated.. 2018.05.29 17:17:27 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.29 17:17:27 - DNS leak protection with packet filtering disabled.. 2018.05.29 17:17:27 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4I 2018.05.29 17:17:31 - Checking authorization ...! 2018.05.29 17:17:32 - Connecting to Chow (United Kingdom, Manchester). 2018.05.29 17:17:32 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.29 17:17:32 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.29 17:17:32 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.29 17:17:32 - Connection to OpenVPN Management Interface. 2018.05.29 17:17:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.29 17:17:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 17:17:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 17:17:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.29 17:17:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.29 17:17:32 - OpenVPN > UDP link local: (not bound). 2018.05.29 17:17:32 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.29 17:17:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.29 17:17:32 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=5d25f3a2 270b8ce8. 2018.05.29 17:17:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.29 17:17:32 - OpenVPN > VERIFY KU OK. 2018.05.29 17:17:32 - OpenVPN > Validating certificate extended key usage. 2018.05.29 17:17:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.29 17:17:32 - OpenVPN > VERIFY EKU OK. 2018.05.29 17:17:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.29 17:17:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.29 17:17:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.29 17:17:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.29 17:17:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.29 17:17:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.29 17:17:33 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.29 17:17:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.29 17:17:33 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.29 17:17:33 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.29 17:17:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.29 17:17:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 17:17:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 17:17:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.29 17:17:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.29 17:17:33 - OpenVPN > interactive service msg_channel=0. 2018.05.29 17:17:33 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=4 HWADDR=14:2d:27:7e:a3:6d. 2018.05.29 17:17:33 - OpenVPN > open_tun. 2018.05.29 17:17:33 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0B0E39F4-4920-4D5F-9086-73C283DC9B52}.tap. 2018.05.29 17:17:33 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.29 17:17:33 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.29 17:17:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {0B0E39F4-4920-4D5F-9086-73C283DC9B52} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.29 17:17:33 - OpenVPN > Successful ARP Flush on interface [33] {0B0E39F4-4920-4D5F-9086-73C283DC9B52}. 2018.05.29 17:17:33 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.29 17:17:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.29 17:17:39 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.29 17:17:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.29 17:17:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 17:17:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 17:17:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 17:17:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 17:17:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.29 17:17:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.29 17:17:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.29 17:17:39 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.29 17:17:39 - DNS leak protection with packet filtering enabled.. 2018.05.29 17:17:39 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.29 17:17:39 - Flushing DNSI 2018.05.29 17:17:42 - Checking routeI 2018.05.29 17:17:42 - Checking DNS! 2018.05.29 17:17:54 - Connected.. 2018.05.29 17:17:54 - OpenVPN > Initialization Sequence Completed Quote Share this post Link to post
after_lunch 4 Posted ... Here are two logs from my morning session on my second Dell Inspiron PC (which sits about 5 feet away from the other one). Lots more disconnects, but MEGA seems to have recovered from them without failing any file uploads. I think this “inactivity disconnect” problem may have been going on for a long time. It’s only during this present brief period of heavy upload activity that I’ve really started to pay attention to it. I can download at 55 Mbps, but upload at only 6 Mbps, so it takes about 1 hour to upload a 2 GB file, and it is inconvenient if one fails. There’s a workaround for that particular problem, of course - I can simply split my RAR archives into smaller parts. In another few days, my heavy uploads to MEGA will have finished, and I can’t recall any downloads being interrupted by an “inactivity disconnect”, so I won’t raise a support ticket. LOG 2018.05.30 03:26 – 07:59 . 2018.05.30 03:26:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 03:26:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 03:26:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 03:26:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 03:26:48 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 03:26:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 03:26:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 03:26:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 03:26:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 03:26:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 03:26:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:26:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 03:26:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:26:48 - OpenVPN > interactive service msg_channel=0. 2018.05.30 03:26:48 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 03:26:49 - OpenVPN > open_tun. 2018.05.30 03:26:49 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 03:26:49 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 03:26:49 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 03:26:49 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 03:26:49 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 03:26:49 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 03:26:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 03:26:53 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 03:26:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 03:26:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:26:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 03:26:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 03:26:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:26:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 03:26:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 03:26:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:26:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 03:26:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 03:26:53 - DNS leak protection with packet filtering enabled.. 2018.05.30 03:26:53 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 03:26:53 - Flushing DNSI 2018.05.30 03:26:56 - Checking routeI 2018.05.30 03:26:57 - Checking DNS! 2018.05.30 03:27:11 - Connected.. 2018.05.30 03:27:11 - OpenVPN > Initialization Sequence Completed. 2018.05.30 03:36:34 - Updating systems & servers data .... 2018.05.30 03:36:59 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 03:36:59 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 03:36:59 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 03:36:59 - Disconnecting. 2018.05.30 03:36:59 - Sending management termination signal. 2018.05.30 03:36:59 - Management - Send 'signal SIGTERM'. 2018.05.30 03:36:59 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 03:36:59 - Connection terminated.. 2018.05.30 03:36:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 03:36:59 - DNS leak protection with packet filtering disabled.. 2018.05.30 03:36:59 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 03:36:59 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 03:37:02 - Checking authorization .... 2018.05.30 03:37:02 - Systems & servers data update completed! 2018.05.30 03:37:02 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 03:37:03 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 03:37:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 03:37:03 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 03:37:03 - Connection to OpenVPN Management Interface. 2018.05.30 03:37:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 03:37:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:37:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:37:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 03:37:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 03:37:03 - OpenVPN > UDP link local: (not bound). 2018.05.30 03:37:03 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 03:37:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 03:37:03 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=1bf84eda 41b0c7e1. 2018.05.30 03:37:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 03:37:03 - OpenVPN > VERIFY KU OK. 2018.05.30 03:37:03 - OpenVPN > Validating certificate extended key usage. 2018.05.30 03:37:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 03:37:03 - OpenVPN > VERIFY EKU OK. 2018.05.30 03:37:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 03:37:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 03:37:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 03:37:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 03:37:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 03:37:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 03:37:04 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 03:37:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 03:37:04 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 03:37:04 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 03:37:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 03:37:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 03:37:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:37:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 03:37:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:37:04 - OpenVPN > interactive service msg_channel=0. 2018.05.30 03:37:04 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 03:37:04 - OpenVPN > open_tun. 2018.05.30 03:37:05 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 03:37:05 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 03:37:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 03:37:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 03:37:05 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 03:37:05 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 03:37:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 03:37:10 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 03:37:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 03:37:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:37:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 03:37:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 03:37:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:37:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 03:37:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 03:37:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:37:10 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 03:37:10 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 03:37:10 - DNS leak protection with packet filtering enabled.. 2018.05.30 03:37:10 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 03:37:10 - Flushing DNSI 2018.05.30 03:37:13 - Checking routeI 2018.05.30 03:37:13 - Checking DNS! 2018.05.30 03:37:28 - Connected.. 2018.05.30 03:37:28 - OpenVPN > Initialization Sequence Completed. 2018.05.30 03:46:54 - Updating systems & servers data .... 2018.05.30 03:46:57 - Systems & servers data update completed. 2018.05.30 03:57:32 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 03:57:32 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 03:57:32 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 03:57:32 - Disconnecting. 2018.05.30 03:57:32 - Sending management termination signal. 2018.05.30 03:57:32 - Management - Send 'signal SIGTERM'. 2018.05.30 03:57:32 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 03:57:32 - Connection terminated.. 2018.05.30 03:57:34 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 03:57:34 - DNS leak protection with packet filtering disabled.. 2018.05.30 03:57:34 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 03:57:34 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 03:57:38 - Checking authorization ...! 2018.05.30 03:57:38 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 03:57:38 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 03:57:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 03:57:38 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 03:57:38 - Connection to OpenVPN Management Interface. 2018.05.30 03:57:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 03:57:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:57:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:57:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 03:57:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 03:57:38 - OpenVPN > UDP link local: (not bound). 2018.05.30 03:57:38 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 03:57:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 03:57:38 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=f50858ad 01e5aa09. 2018.05.30 03:57:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 03:57:38 - OpenVPN > VERIFY KU OK. 2018.05.30 03:57:38 - OpenVPN > Validating certificate extended key usage. 2018.05.30 03:57:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 03:57:38 - OpenVPN > VERIFY EKU OK. 2018.05.30 03:57:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 03:57:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 03:57:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 03:57:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 03:57:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 03:57:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 03:57:40 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 03:57:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 03:57:40 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 03:57:40 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 03:57:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 03:57:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 03:57:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:57:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 03:57:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 03:57:40 - OpenVPN > interactive service msg_channel=0. 2018.05.30 03:57:40 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 03:57:40 - OpenVPN > open_tun. 2018.05.30 03:57:40 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 03:57:40 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 03:57:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 03:57:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 03:57:40 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 03:57:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 03:57:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 03:57:46 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 03:57:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 03:57:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:57:46 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 03:57:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 03:57:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:57:46 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 03:57:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 03:57:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 03:57:46 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 03:57:46 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 03:57:46 - DNS leak protection with packet filtering enabled.. 2018.05.30 03:57:46 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 03:57:46 - Flushing DNSI 2018.05.30 03:57:49 - Checking routeI 2018.05.30 03:57:52 - Checking DNS. 2018.05.30 03:57:55 - Updating systems & servers data .... 2018.05.30 03:57:58 - Systems & servers data update completed! 2018.05.30 03:58:07 - Connected.. 2018.05.30 03:58:07 - OpenVPN > Initialization Sequence Completed. 2018.05.30 04:08:55 - Updating systems & servers data .... 2018.05.30 04:08:56 - Systems & servers data update completed. 2018.05.30 04:19:53 - Updating systems & servers data .... 2018.05.30 04:19:56 - Systems & servers data update completed. 2018.05.30 04:26:21 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 04:26:21 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 04:26:21 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 04:26:21 - Disconnecting. 2018.05.30 04:26:21 - Sending management termination signal. 2018.05.30 04:26:21 - Management - Send 'signal SIGTERM'. 2018.05.30 04:26:21 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 04:26:22 - Connection terminated.. 2018.05.30 04:26:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 04:26:23 - DNS leak protection with packet filtering disabled.. 2018.05.30 04:26:23 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 04:26:23 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 04:26:30 - Checking authorization ...! 2018.05.30 04:26:30 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 04:26:30 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 04:26:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 04:26:30 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 04:26:30 - Connection to OpenVPN Management Interface. 2018.05.30 04:26:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 04:26:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:26:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:26:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 04:26:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 04:26:30 - OpenVPN > UDP link local: (not bound). 2018.05.30 04:26:30 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 04:26:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 04:26:31 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=af3f99bc c96a74d7. 2018.05.30 04:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 04:26:31 - OpenVPN > VERIFY KU OK. 2018.05.30 04:26:31 - OpenVPN > Validating certificate extended key usage. 2018.05.30 04:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 04:26:31 - OpenVPN > VERIFY EKU OK. 2018.05.30 04:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 04:26:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 04:26:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 04:26:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 04:26:35 - OpenVPN > Key [AF_INET]89.249.74.217:443 [0] not initialized (yet), dropping packet.. 2018.05.30 04:26:37 - Above log line repeated 1 times more. 2018.05.30 04:26:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 04:26:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 04:26:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 04:26:39 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 04:26:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 04:26:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 04:26:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 04:26:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 04:26:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 04:26:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:26:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 04:26:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:26:39 - OpenVPN > interactive service msg_channel=0. 2018.05.30 04:26:39 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 04:26:39 - OpenVPN > open_tun. 2018.05.30 04:26:39 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 04:26:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 04:26:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 04:26:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 04:26:39 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 04:26:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 04:26:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 04:26:43 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 04:26:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 04:26:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:26:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 04:26:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 04:26:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:26:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 04:26:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 04:26:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:26:43 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 04:26:43 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 04:26:43 - DNS leak protection with packet filtering enabled.. 2018.05.30 04:26:43 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 04:26:43 - Flushing DNSI 2018.05.30 04:26:46 - Checking routeI 2018.05.30 04:26:48 - Checking DNS! 2018.05.30 04:27:00 - Connected.. 2018.05.30 04:27:01 - OpenVPN > Initialization Sequence Completed. 2018.05.30 04:30:53 - Updating systems & servers data .... 2018.05.30 04:30:54 - Systems & servers data update completed. 2018.05.30 04:41:51 - Updating systems & servers data .... 2018.05.30 04:41:54 - Systems & servers data update completed. 2018.05.30 04:47:30 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 04:47:30 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 04:47:30 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 04:47:30 - Disconnecting. 2018.05.30 04:47:30 - Sending management termination signal. 2018.05.30 04:47:30 - Management - Send 'signal SIGTERM'. 2018.05.30 04:47:30 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 04:47:30 - Connection terminated.. 2018.05.30 04:47:30 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 04:47:30 - DNS leak protection with packet filtering disabled.. 2018.05.30 04:47:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 04:47:30 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 04:47:39 - Checking authorization ...! 2018.05.30 04:47:39 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 04:47:39 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 04:47:39 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 04:47:39 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 04:47:39 - Connection to OpenVPN Management Interface. 2018.05.30 04:47:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 04:47:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:47:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:47:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 04:47:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 04:47:39 - OpenVPN > UDP link local: (not bound). 2018.05.30 04:47:39 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 04:47:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 04:47:39 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=d85c14f7 8e0a358e. 2018.05.30 04:47:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 04:47:39 - OpenVPN > VERIFY KU OK. 2018.05.30 04:47:39 - OpenVPN > Validating certificate extended key usage. 2018.05.30 04:47:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 04:47:39 - OpenVPN > VERIFY EKU OK. 2018.05.30 04:47:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 04:47:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 04:47:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 04:47:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 04:47:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 04:47:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 04:47:41 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 04:47:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 04:47:41 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 04:47:41 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 04:47:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 04:47:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 04:47:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:47:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 04:47:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:47:41 - OpenVPN > interactive service msg_channel=0. 2018.05.30 04:47:41 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 04:47:41 - OpenVPN > open_tun. 2018.05.30 04:47:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 04:47:41 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 04:47:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 04:47:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 04:47:41 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 04:47:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 04:47:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 04:47:46 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 04:47:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 04:47:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:47:46 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 04:47:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 04:47:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:47:46 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 04:47:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 04:47:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:47:46 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 04:47:46 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 04:47:46 - DNS leak protection with packet filtering enabled.. 2018.05.30 04:47:46 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 04:47:46 - Flushing DNSI 2018.05.30 04:47:49 - Checking routeI 2018.05.30 04:47:52 - Checking DNS! 2018.05.30 04:48:06 - Connected.. 2018.05.30 04:48:06 - OpenVPN > Initialization Sequence Completed. 2018.05.30 04:52:52 - Updating systems & servers data .... 2018.05.30 04:52:55 - Systems & servers data update completed. 2018.05.30 04:56:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 04:56:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 04:56:36 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 04:56:36 - Disconnecting. 2018.05.30 04:56:36 - Sending management termination signal. 2018.05.30 04:56:36 - Management - Send 'signal SIGTERM'. 2018.05.30 04:56:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 04:56:36 - Connection terminated.. 2018.05.30 04:56:36 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 04:56:36 - DNS leak protection with packet filtering disabled.. 2018.05.30 04:56:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 04:56:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 04:56:39 - Checking authorization ...! 2018.05.30 04:56:40 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 04:56:40 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 04:56:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 04:56:40 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 04:56:40 - Connection to OpenVPN Management Interface. 2018.05.30 04:56:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 04:56:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:56:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:56:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 04:56:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 04:56:40 - OpenVPN > UDP link local: (not bound). 2018.05.30 04:56:40 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 04:56:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 04:56:40 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=d0f43842 d7d49ba8. 2018.05.30 04:56:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 04:56:40 - OpenVPN > VERIFY KU OK. 2018.05.30 04:56:40 - OpenVPN > Validating certificate extended key usage. 2018.05.30 04:56:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 04:56:40 - OpenVPN > VERIFY EKU OK. 2018.05.30 04:56:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 04:56:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 04:56:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 04:56:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 04:57:01 - Above log line repeated 3 times more. 2018.05.30 04:57:01 - OpenVPN > Key [AF_INET]89.249.74.217:443 [0] not initialized (yet), dropping packet.. 2018.05.30 04:57:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 04:57:12 - Above log line repeated 2 times more. 2018.05.30 04:57:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 04:57:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 04:57:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 04:57:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 04:57:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 04:57:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 04:57:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 04:57:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 04:57:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:57:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 04:57:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 04:57:12 - OpenVPN > interactive service msg_channel=0. 2018.05.30 04:57:12 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 04:57:12 - OpenVPN > open_tun. 2018.05.30 04:57:13 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 04:57:13 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 04:57:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 04:57:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 04:57:13 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 04:57:13 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 04:57:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 04:57:18 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 04:57:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 04:57:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:57:18 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 04:57:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 04:57:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:57:18 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 04:57:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 04:57:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 04:57:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 04:57:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 04:57:18 - DNS leak protection with packet filtering enabled.. 2018.05.30 04:57:18 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 04:57:18 - Flushing DNSI 2018.05.30 04:57:21 - Checking routeI 2018.05.30 04:57:21 - Checking DNS! 2018.05.30 04:57:35 - Connected.. 2018.05.30 04:57:35 - OpenVPN > Initialization Sequence Completed. 2018.05.30 05:03:53 - Updating systems & servers data .... 2018.05.30 05:03:55 - Systems & servers data update completed. 2018.05.30 05:14:52 - Updating systems & servers data .... 2018.05.30 05:14:53 - Systems & servers data update completed. 2018.05.30 05:25:50 - Updating systems & servers data .... 2018.05.30 05:25:52 - Systems & servers data update completed. 2018.05.30 05:27:18 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 05:27:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 05:27:18 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 05:27:18 - Disconnecting. 2018.05.30 05:27:18 - Sending management termination signal. 2018.05.30 05:27:18 - Management - Send 'signal SIGTERM'. 2018.05.30 05:27:18 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 05:27:18 - Connection terminated.. 2018.05.30 05:27:19 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 05:27:19 - DNS leak protection with packet filtering disabled.. 2018.05.30 05:27:19 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 05:27:19 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 05:27:26 - Checking authorization ...! 2018.05.30 05:27:26 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 05:27:26 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 05:27:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 05:27:26 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 05:27:26 - Connection to OpenVPN Management Interface. 2018.05.30 05:27:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 05:27:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:27:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:27:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 05:27:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 05:27:26 - OpenVPN > UDP link local: (not bound). 2018.05.30 05:27:26 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 05:27:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 05:27:26 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=c70287c3 1860c29d. 2018.05.30 05:27:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 05:27:27 - OpenVPN > VERIFY KU OK. 2018.05.30 05:27:27 - OpenVPN > Validating certificate extended key usage. 2018.05.30 05:27:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 05:27:27 - OpenVPN > VERIFY EKU OK. 2018.05.30 05:27:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 05:27:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 05:27:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 05:27:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 05:27:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 05:27:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 05:27:28 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 05:27:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 05:27:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 05:27:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 05:27:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 05:27:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 05:27:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:27:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 05:27:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:27:28 - OpenVPN > interactive service msg_channel=0. 2018.05.30 05:27:28 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 05:27:28 - OpenVPN > open_tun. 2018.05.30 05:27:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 05:27:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 05:27:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 05:27:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 05:27:28 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 05:27:28 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 05:27:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 05:27:33 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 05:27:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 05:27:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 05:27:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 05:27:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 05:27:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 05:27:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 05:27:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 05:27:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 05:27:33 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 05:27:33 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 05:27:33 - DNS leak protection with packet filtering enabled.. 2018.05.30 05:27:33 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 05:27:33 - Flushing DNSI 2018.05.30 05:27:36 - Checking routeI 2018.05.30 05:27:41 - Checking DNS! 2018.05.30 05:27:55 - Connected.. 2018.05.30 05:27:55 - OpenVPN > Initialization Sequence Completed. 2018.05.30 05:36:50 - Updating systems & servers data .... 2018.05.30 05:36:51 - Systems & servers data update completed. 2018.05.30 05:46:09 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 05:46:09 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 05:46:09 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 05:46:09 - Disconnecting. 2018.05.30 05:46:09 - Sending management termination signal. 2018.05.30 05:46:09 - Management - Send 'signal SIGTERM'. 2018.05.30 05:46:09 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 05:46:09 - Connection terminated.. 2018.05.30 05:46:09 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 05:46:09 - DNS leak protection with packet filtering disabled.. 2018.05.30 05:46:09 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 05:46:09 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 05:46:18 - Checking authorization ...! 2018.05.30 05:46:18 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 05:46:18 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 05:46:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 05:46:18 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 05:46:18 - Connection to OpenVPN Management Interface. 2018.05.30 05:46:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 05:46:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:46:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:46:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 05:46:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 05:46:18 - OpenVPN > UDP link local: (not bound). 2018.05.30 05:46:18 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 05:46:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 05:46:18 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=e3fb7e85 edc129f4. 2018.05.30 05:46:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 05:46:18 - OpenVPN > VERIFY KU OK. 2018.05.30 05:46:18 - OpenVPN > Validating certificate extended key usage. 2018.05.30 05:46:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 05:46:18 - OpenVPN > VERIFY EKU OK. 2018.05.30 05:46:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 05:46:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 05:46:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 05:46:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 05:46:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 05:46:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 05:46:20 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 05:46:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 05:46:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 05:46:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 05:46:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 05:46:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 05:46:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:46:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 05:46:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 05:46:20 - OpenVPN > interactive service msg_channel=0. 2018.05.30 05:46:20 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 05:46:20 - OpenVPN > open_tun. 2018.05.30 05:46:20 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 05:46:20 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 05:46:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 05:46:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 05:46:20 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 05:46:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 05:46:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 05:46:26 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 05:46:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 05:46:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 05:46:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 05:46:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 05:46:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 05:46:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 05:46:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 05:46:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 05:46:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 05:46:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 05:46:26 - DNS leak protection with packet filtering enabled.. 2018.05.30 05:46:26 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 05:46:26 - Flushing DNSI 2018.05.30 05:46:29 - Checking routeI 2018.05.30 05:46:29 - Checking DNS! 2018.05.30 05:46:42 - Connected.. 2018.05.30 05:46:42 - OpenVPN > Initialization Sequence Completed. 2018.05.30 05:47:49 - Updating systems & servers data .... 2018.05.30 05:47:50 - Systems & servers data update completed. 2018.05.30 05:58:49 - Updating systems & servers data .... 2018.05.30 05:58:53 - Systems & servers data update completed. 2018.05.30 06:09:51 - Updating systems & servers data .... 2018.05.30 06:09:54 - Systems & servers data update completed. 2018.05.30 06:16:14 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 06:16:14 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 06:16:14 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 06:16:14 - Disconnecting. 2018.05.30 06:16:14 - Sending management termination signal. 2018.05.30 06:16:14 - Management - Send 'signal SIGTERM'. 2018.05.30 06:16:14 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 06:16:14 - Connection terminated.. 2018.05.30 06:16:14 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 06:16:14 - DNS leak protection with packet filtering disabled.. 2018.05.30 06:16:14 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 06:16:14 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 06:16:19 - Checking authorization ...! 2018.05.30 06:16:20 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 06:16:20 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 06:16:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 06:16:20 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 06:16:20 - Connection to OpenVPN Management Interface. 2018.05.30 06:16:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 06:16:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:16:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:16:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 06:16:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 06:16:20 - OpenVPN > UDP link local: (not bound). 2018.05.30 06:16:20 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 06:16:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 06:16:20 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=d8e69ea7 7231d940. 2018.05.30 06:16:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 06:16:20 - OpenVPN > VERIFY KU OK. 2018.05.30 06:16:20 - OpenVPN > Validating certificate extended key usage. 2018.05.30 06:16:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 06:16:20 - OpenVPN > VERIFY EKU OK. 2018.05.30 06:16:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 06:16:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 06:16:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 06:16:21 - OpenVPN > Key [AF_INET]89.249.74.217:443 [0] not initialized (yet), dropping packet.. 2018.05.30 06:16:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 06:16:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 06:16:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 06:16:21 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 06:16:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 06:16:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 06:16:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 06:16:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 06:16:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 06:16:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:16:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 06:16:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:16:21 - OpenVPN > interactive service msg_channel=0. 2018.05.30 06:16:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 06:16:21 - OpenVPN > open_tun. 2018.05.30 06:16:21 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 06:16:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 06:16:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 06:16:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 06:16:21 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 06:16:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 06:16:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 06:16:26 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 06:16:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 06:16:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:16:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 06:16:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 06:16:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:16:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 06:16:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 06:16:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:16:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 06:16:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 06:16:26 - DNS leak protection with packet filtering enabled.. 2018.05.30 06:16:26 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 06:16:26 - Flushing DNSI 2018.05.30 06:16:29 - Checking routeI 2018.05.30 06:16:31 - Checking DNS! 2018.05.30 06:16:46 - Connected.. 2018.05.30 06:16:46 - OpenVPN > Initialization Sequence Completed. 2018.05.30 06:20:52 - Updating systems & servers data .... 2018.05.30 06:20:54 - Systems & servers data update completed. 2018.05.30 06:26:07 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 06:26:07 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 06:26:07 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 06:26:07 - Disconnecting. 2018.05.30 06:26:07 - Sending management termination signal. 2018.05.30 06:26:07 - Management - Send 'signal SIGTERM'. 2018.05.30 06:26:07 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 06:26:07 - Connection terminated.. 2018.05.30 06:26:08 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 06:26:08 - DNS leak protection with packet filtering disabled.. 2018.05.30 06:26:08 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 06:26:08 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 06:26:11 - Checking authorization ...! 2018.05.30 06:26:11 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 06:26:11 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 06:26:11 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 06:26:11 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 06:26:11 - Connection to OpenVPN Management Interface. 2018.05.30 06:26:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 06:26:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:26:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:26:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 06:26:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 06:26:12 - OpenVPN > UDP link local: (not bound). 2018.05.30 06:26:12 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 06:26:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 06:26:12 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=63d8978d 980bfcb3. 2018.05.30 06:26:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 06:26:12 - OpenVPN > VERIFY KU OK. 2018.05.30 06:26:12 - OpenVPN > Validating certificate extended key usage. 2018.05.30 06:26:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 06:26:12 - OpenVPN > VERIFY EKU OK. 2018.05.30 06:26:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 06:26:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 06:26:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 06:26:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 06:26:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 06:26:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 06:26:13 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 06:26:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 06:26:13 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 06:26:13 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 06:26:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 06:26:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 06:26:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:26:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 06:26:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:26:13 - OpenVPN > interactive service msg_channel=0. 2018.05.30 06:26:13 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 06:26:13 - OpenVPN > open_tun. 2018.05.30 06:26:13 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 06:26:13 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 06:26:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 06:26:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 06:26:13 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 06:26:13 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 06:26:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 06:26:19 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 06:26:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 06:26:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:26:19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 06:26:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 06:26:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:26:19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 06:26:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 06:26:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:26:19 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 06:26:19 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 06:26:19 - DNS leak protection with packet filtering enabled.. 2018.05.30 06:26:19 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 06:26:19 - Flushing DNSI 2018.05.30 06:26:22 - Checking routeI 2018.05.30 06:26:22 - Checking DNS! 2018.05.30 06:26:35 - Connected.. 2018.05.30 06:26:35 - OpenVPN > Initialization Sequence Completed. 2018.05.30 06:31:52 - Updating systems & servers data .... 2018.05.30 06:31:55 - Systems & servers data update completed. 2018.05.30 06:36:23 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 06:36:23 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 06:36:23 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 06:36:23 - Disconnecting. 2018.05.30 06:36:23 - Sending management termination signal. 2018.05.30 06:36:23 - Management - Send 'signal SIGTERM'. 2018.05.30 06:36:23 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 06:36:23 - Connection terminated.. 2018.05.30 06:36:23 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 06:36:23 - DNS leak protection with packet filtering disabled.. 2018.05.30 06:36:23 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 06:36:23 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 06:36:28 - Checking authorization ...! 2018.05.30 06:36:28 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 06:36:28 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 06:36:28 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 06:36:28 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 06:36:28 - Connection to OpenVPN Management Interface. 2018.05.30 06:36:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 06:36:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:36:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:36:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 06:36:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 06:36:28 - OpenVPN > UDP link local: (not bound). 2018.05.30 06:36:28 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 06:36:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 06:36:28 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=b2609860 8167235e. 2018.05.30 06:36:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 06:36:28 - OpenVPN > VERIFY KU OK. 2018.05.30 06:36:28 - OpenVPN > Validating certificate extended key usage. 2018.05.30 06:36:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 06:36:28 - OpenVPN > VERIFY EKU OK. 2018.05.30 06:36:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 06:36:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 06:36:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 06:36:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 06:36:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 06:36:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 06:36:30 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 06:36:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 06:36:30 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 06:36:30 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 06:36:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 06:36:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 06:36:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:36:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 06:36:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 06:36:30 - OpenVPN > interactive service msg_channel=0. 2018.05.30 06:36:30 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 06:36:30 - OpenVPN > open_tun. 2018.05.30 06:36:30 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 06:36:30 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 06:36:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 06:36:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 06:36:30 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 06:36:30 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 06:36:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 06:36:36 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 06:36:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 06:36:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:36:36 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 06:36:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 06:36:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:36:36 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 06:36:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 06:36:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 06:36:36 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 06:36:36 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 06:36:36 - DNS leak protection with packet filtering enabled.. 2018.05.30 06:36:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 06:36:36 - Flushing DNSI 2018.05.30 06:36:39 - Checking routeI 2018.05.30 06:36:39 - Checking DNS! 2018.05.30 06:36:51 - Connected.. 2018.05.30 06:36:51 - OpenVPN > Initialization Sequence Completed. 2018.05.30 06:42:52 - Updating systems & servers data .... 2018.05.30 06:42:55 - Systems & servers data update completed. 2018.05.30 06:53:52 - Updating systems & servers data .... 2018.05.30 06:53:55 - Systems & servers data update completed. 2018.05.30 07:04:52 - Updating systems & servers data .... 2018.05.30 07:04:55 - Systems & servers data update completed. 2018.05.30 07:06:02 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 07:06:02 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 07:06:02 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 07:06:02 - Disconnecting. 2018.05.30 07:06:02 - Sending management termination signal. 2018.05.30 07:06:02 - Management - Send 'signal SIGTERM'. 2018.05.30 07:06:02 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 07:06:03 - Connection terminated.. 2018.05.30 07:06:04 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 07:06:05 - DNS leak protection with packet filtering disabled.. 2018.05.30 07:06:05 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 07:06:05 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 07:06:13 - Checking authorization ...! 2018.05.30 07:06:14 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 07:06:14 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 07:06:14 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 07:06:14 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 07:06:14 - Connection to OpenVPN Management Interface. 2018.05.30 07:06:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 07:06:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:06:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:06:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 07:06:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 07:06:14 - OpenVPN > UDP link local: (not bound). 2018.05.30 07:06:14 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 07:06:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 07:06:14 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=48ba610d d92bf1d4. 2018.05.30 07:06:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 07:06:14 - OpenVPN > VERIFY KU OK. 2018.05.30 07:06:14 - OpenVPN > Validating certificate extended key usage. 2018.05.30 07:06:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 07:06:14 - OpenVPN > VERIFY EKU OK. 2018.05.30 07:06:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 07:06:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 07:06:14 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 07:06:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 07:06:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 07:06:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:06:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:06:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:06:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:06:16 - OpenVPN > interactive service msg_channel=0. 2018.05.30 07:06:16 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 07:06:16 - OpenVPN > open_tun. 2018.05.30 07:06:16 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 07:06:16 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 07:06:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 07:06:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 07:06:16 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 07:06:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 07:06:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 07:06:21 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 07:06:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 07:06:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:06:21 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:06:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:06:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:06:21 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:06:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:06:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:06:21 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 07:06:21 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 07:06:21 - DNS leak protection with packet filtering enabled.. 2018.05.30 07:06:21 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 07:06:21 - Flushing DNSI 2018.05.30 07:06:24 - Checking routeI 2018.05.30 07:06:30 - Checking DNS! 2018.05.30 07:06:45 - Connected.. 2018.05.30 07:06:45 - OpenVPN > Initialization Sequence Completed. 2018.05.30 07:15:52 - Updating systems & servers data .... 2018.05.30 07:16:31 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 07:16:31 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 07:16:31 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 07:16:31 - Disconnecting. 2018.05.30 07:16:31 - Sending management termination signal. 2018.05.30 07:16:31 - Management - Send 'signal SIGTERM'. 2018.05.30 07:16:31 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 07:16:31 - Connection terminated.. 2018.05.30 07:16:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 07:16:31 - DNS leak protection with packet filtering disabled.. 2018.05.30 07:16:31 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 07:16:31 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 07:16:34 - Checking authorization .... 2018.05.30 07:16:35 - Systems & servers data update completed! 2018.05.30 07:16:35 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 07:16:35 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 07:16:35 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 07:16:35 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 07:16:35 - Connection to OpenVPN Management Interface. 2018.05.30 07:16:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 07:16:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 07:16:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 07:16:35 - OpenVPN > UDP link local: (not bound). 2018.05.30 07:16:35 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 07:16:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 07:16:35 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=c4f9c0ec 2754ffc8. 2018.05.30 07:16:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 07:16:35 - OpenVPN > VERIFY KU OK. 2018.05.30 07:16:35 - OpenVPN > Validating certificate extended key usage. 2018.05.30 07:16:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 07:16:35 - OpenVPN > VERIFY EKU OK. 2018.05.30 07:16:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 07:16:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 07:16:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 07:16:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 07:16:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 07:16:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:16:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:16:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:37 - OpenVPN > interactive service msg_channel=0. 2018.05.30 07:16:37 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 07:16:37 - OpenVPN > open_tun. 2018.05.30 07:16:37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 07:16:37 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 07:16:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 07:16:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 07:16:37 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 07:16:37 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 07:16:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 07:16:42 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 07:16:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 07:16:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:16:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:16:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:16:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:16:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:16:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:16:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:16:43 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 07:16:43 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 07:16:43 - DNS leak protection with packet filtering enabled.. 2018.05.30 07:16:43 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 07:16:43 - Flushing DNSI 2018.05.30 07:16:46 - Checking routeI 2018.05.30 07:16:46 - Checking DNS! 2018.05.30 07:17:00 - Connected.. 2018.05.30 07:17:00 - OpenVPN > Initialization Sequence Completed. 2018.05.30 07:26:27 - Updating systems & servers data .... 2018.05.30 07:26:28 - Systems & servers data update completed. 2018.05.30 07:37:25 - Updating systems & servers data .... 2018.05.30 07:37:27 - Systems & servers data update completed. 2018.05.30 07:48:23 - Updating systems & servers data .... 2018.05.30 07:48:26 - Systems & servers data update completed. 2018.05.30 07:59:25 - Updating systems & servers data .... 2018.05.30 07:59:28 - Systems & servers data update completed LOG 2018.05.30 07:06 – 11:59 . 2018.05.30 07:06:14 - OpenVPN > VERIFY KU OK. 2018.05.30 07:06:14 - OpenVPN > Validating certificate extended key usage. 2018.05.30 07:06:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 07:06:14 - OpenVPN > VERIFY EKU OK. 2018.05.30 07:06:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 07:06:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 07:06:14 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 07:06:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 07:06:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 07:06:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 07:06:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:06:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:06:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:06:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:06:16 - OpenVPN > interactive service msg_channel=0. 2018.05.30 07:06:16 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 07:06:16 - OpenVPN > open_tun. 2018.05.30 07:06:16 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 07:06:16 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 07:06:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 07:06:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 07:06:16 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 07:06:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 07:06:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 07:06:21 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 07:06:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 07:06:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:06:21 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:06:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:06:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:06:21 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:06:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:06:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:06:21 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 07:06:21 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 07:06:21 - DNS leak protection with packet filtering enabled.. 2018.05.30 07:06:21 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 07:06:21 - Flushing DNSI 2018.05.30 07:06:24 - Checking routeI 2018.05.30 07:06:30 - Checking DNS! 2018.05.30 07:06:45 - Connected.. 2018.05.30 07:06:45 - OpenVPN > Initialization Sequence Completed. 2018.05.30 07:15:52 - Updating systems & servers data .... 2018.05.30 07:16:31 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 07:16:31 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 07:16:31 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 07:16:31 - Disconnecting. 2018.05.30 07:16:31 - Sending management termination signal. 2018.05.30 07:16:31 - Management - Send 'signal SIGTERM'. 2018.05.30 07:16:31 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 07:16:31 - Connection terminated.. 2018.05.30 07:16:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 07:16:31 - DNS leak protection with packet filtering disabled.. 2018.05.30 07:16:31 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 07:16:31 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 07:16:34 - Checking authorization .... 2018.05.30 07:16:35 - Systems & servers data update completed! 2018.05.30 07:16:35 - Connecting to Chow (United Kingdom, Manchester). 2018.05.30 07:16:35 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 07:16:35 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 07:16:35 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 07:16:35 - Connection to OpenVPN Management Interface. 2018.05.30 07:16:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 07:16:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.217:443. 2018.05.30 07:16:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 07:16:35 - OpenVPN > UDP link local: (not bound). 2018.05.30 07:16:35 - OpenVPN > UDP link remote: [AF_INET]89.249.74.217:443. 2018.05.30 07:16:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 07:16:35 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.217:443, sid=c4f9c0ec 2754ffc8. 2018.05.30 07:16:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 07:16:35 - OpenVPN > VERIFY KU OK. 2018.05.30 07:16:35 - OpenVPN > Validating certificate extended key usage. 2018.05.30 07:16:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 07:16:35 - OpenVPN > VERIFY EKU OK. 2018.05.30 07:16:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 07:16:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 07:16:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.217:443. 2018.05.30 07:16:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 07:16:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.130 255.255.0.0'. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 07:16:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 07:16:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:16:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 07:16:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 07:16:37 - OpenVPN > interactive service msg_channel=0. 2018.05.30 07:16:37 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 07:16:37 - OpenVPN > open_tun. 2018.05.30 07:16:37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 07:16:37 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 07:16:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.130/255.255.0.0 [sUCCEEDED]. 2018.05.30 07:16:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.130/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 07:16:37 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 07:16:37 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 07:16:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 07:16:42 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.217 MASK 255.255.255.255 192.168.0.1. 2018.05.30 07:16:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 07:16:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:16:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:16:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:16:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:16:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 07:16:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 07:16:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 07:16:43 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 07:16:43 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 07:16:43 - DNS leak protection with packet filtering enabled.. 2018.05.30 07:16:43 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 07:16:43 - Flushing DNSI 2018.05.30 07:16:46 - Checking routeI 2018.05.30 07:16:46 - Checking DNS! 2018.05.30 07:17:00 - Connected.. 2018.05.30 07:17:00 - OpenVPN > Initialization Sequence Completed. 2018.05.30 07:26:27 - Updating systems & servers data .... 2018.05.30 07:26:28 - Systems & servers data update completed. 2018.05.30 07:37:25 - Updating systems & servers data .... 2018.05.30 07:37:27 - Systems & servers data update completed. 2018.05.30 07:48:23 - Updating systems & servers data .... 2018.05.30 07:48:26 - Systems & servers data update completed. 2018.05.30 07:59:25 - Updating systems & servers data .... 2018.05.30 07:59:28 - Systems & servers data update completed. 2018.05.30 08:10:24 - Updating systems & servers data .... 2018.05.30 08:10:25 - Systems & servers data update completed! 2018.05.30 08:11:11 - Disconnecting. 2018.05.30 08:11:11 - Sending management termination signal. 2018.05.30 08:11:11 - Management - Send 'signal SIGTERM'. 2018.05.30 08:11:17 - Connection terminated.. 2018.05.30 08:11:18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 08:11:19 - DNS leak protection with packet filtering disabled.. 2018.05.30 08:11:19 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 08:11:19 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 08:11:19 - Checking authorization ...! 2018.05.30 08:11:19 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 08:11:19 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 08:11:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 08:11:19 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 08:11:19 - Connection to OpenVPN Management Interface. 2018.05.30 08:11:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 08:11:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:11:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:11:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 08:11:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 08:11:19 - OpenVPN > UDP link local: (not bound). 2018.05.30 08:11:19 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 08:11:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 08:11:19 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=f2204e6f 357cfb95. 2018.05.30 08:11:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 08:11:19 - OpenVPN > VERIFY KU OK. 2018.05.30 08:11:19 - OpenVPN > Validating certificate extended key usage. 2018.05.30 08:11:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 08:11:19 - OpenVPN > VERIFY EKU OK. 2018.05.30 08:11:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 08:11:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 08:11:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 08:11:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 08:11:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 08:11:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 08:11:21 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 08:11:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 08:11:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 08:11:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 08:11:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 08:11:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:11:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:11:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:11:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:11:21 - OpenVPN > interactive service msg_channel=0. 2018.05.30 08:11:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 08:11:21 - OpenVPN > open_tun. 2018.05.30 08:11:21 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 08:11:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 08:11:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 08:11:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 08:11:21 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 08:11:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 08:11:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 08:11:26 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 08:11:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 08:11:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:11:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:11:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:11:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:11:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:11:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:11:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:11:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 08:11:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 08:11:26 - DNS leak protection with packet filtering enabled.. 2018.05.30 08:11:26 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 08:11:26 - Flushing DNSI 2018.05.30 08:11:29 - Checking routeI 2018.05.30 08:11:30 - Checking DNS! 2018.05.30 08:11:42 - Connected.. 2018.05.30 08:11:42 - OpenVPN > Initialization Sequence Completed. 2018.05.30 08:21:22 - Updating systems & servers data .... 2018.05.30 08:21:25 - Systems & servers data update completed. 2018.05.30 08:26:37 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 08:26:37 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 08:26:37 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 08:26:37 - Disconnecting. 2018.05.30 08:26:37 - Sending management termination signal. 2018.05.30 08:26:37 - Management - Send 'signal SIGTERM'. 2018.05.30 08:26:37 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 08:26:38 - Connection terminated.. 2018.05.30 08:26:38 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 08:26:38 - DNS leak protection with packet filtering disabled.. 2018.05.30 08:26:38 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 08:26:38 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 08:26:44 - Checking authorization ...! 2018.05.30 08:26:45 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 08:26:45 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 08:26:45 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 08:26:45 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 08:26:45 - Connection to OpenVPN Management Interface. 2018.05.30 08:26:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 08:26:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:26:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:26:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 08:26:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 08:26:45 - OpenVPN > UDP link local: (not bound). 2018.05.30 08:26:45 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 08:26:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 08:26:45 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=580a73f0 0420fa19. 2018.05.30 08:26:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 08:26:45 - OpenVPN > VERIFY KU OK. 2018.05.30 08:26:45 - OpenVPN > Validating certificate extended key usage. 2018.05.30 08:26:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 08:26:45 - OpenVPN > VERIFY EKU OK. 2018.05.30 08:26:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 08:26:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 08:26:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 08:26:46 - OpenVPN > Key [AF_INET]89.249.74.212:443 [0] not initialized (yet), dropping packet.. 2018.05.30 08:26:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 08:26:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 08:26:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 08:26:46 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 08:26:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 08:26:46 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 08:26:46 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 08:26:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 08:26:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:26:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:26:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:26:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:26:46 - OpenVPN > interactive service msg_channel=0. 2018.05.30 08:26:46 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 08:26:46 - OpenVPN > open_tun. 2018.05.30 08:26:46 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 08:26:46 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 08:26:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 08:26:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 08:26:46 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 08:26:46 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 08:26:51 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 08:26:51 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 08:26:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 08:26:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:26:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:26:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:26:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:26:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:26:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:26:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:26:52 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 08:26:52 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 08:26:52 - DNS leak protection with packet filtering enabled.. 2018.05.30 08:26:52 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 08:26:52 - Flushing DNSI 2018.05.30 08:26:55 - Checking routeI 2018.05.30 08:26:55 - Checking DNS! 2018.05.30 08:27:09 - Connected.. 2018.05.30 08:27:09 - OpenVPN > Initialization Sequence Completed. 2018.05.30 08:32:23 - Updating systems & servers data .... 2018.05.30 08:32:25 - Systems & servers data update completed. 2018.05.30 08:43:23 - Updating systems & servers data .... 2018.05.30 08:43:26 - Systems & servers data update completed. 2018.05.30 08:46:44 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 08:46:44 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 08:46:44 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 08:46:44 - Disconnecting. 2018.05.30 08:46:44 - Sending management termination signal. 2018.05.30 08:46:44 - Management - Send 'signal SIGTERM'. 2018.05.30 08:46:44 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 08:46:44 - Connection terminated.. 2018.05.30 08:46:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 08:46:44 - DNS leak protection with packet filtering disabled.. 2018.05.30 08:46:44 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 08:46:44 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 08:46:52 - Checking authorization ...! 2018.05.30 08:46:52 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 08:46:52 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 08:46:52 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 08:46:52 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 08:46:52 - Connection to OpenVPN Management Interface. 2018.05.30 08:46:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 08:46:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:46:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:46:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 08:46:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 08:46:52 - OpenVPN > UDP link local: (not bound). 2018.05.30 08:46:52 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 08:46:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 08:46:52 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=9a55aae2 9e442dcc. 2018.05.30 08:46:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 08:46:52 - OpenVPN > VERIFY KU OK. 2018.05.30 08:46:52 - OpenVPN > Validating certificate extended key usage. 2018.05.30 08:46:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 08:46:52 - OpenVPN > VERIFY EKU OK. 2018.05.30 08:46:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 08:46:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 08:46:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 08:46:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 08:46:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 08:46:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 08:46:54 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 08:46:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 08:46:54 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 08:46:54 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 08:46:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 08:46:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:46:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:46:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:46:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:46:54 - OpenVPN > interactive service msg_channel=0. 2018.05.30 08:46:54 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 08:46:54 - OpenVPN > open_tun. 2018.05.30 08:46:54 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 08:46:54 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 08:46:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 08:46:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 08:46:54 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 08:46:54 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 08:46:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 08:46:59 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 08:46:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 08:46:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:46:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:46:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:46:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:46:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:46:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:46:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:46:59 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 08:46:59 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 08:46:59 - DNS leak protection with packet filtering enabled.. 2018.05.30 08:46:59 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 08:46:59 - Flushing DNSI 2018.05.30 08:47:03 - Checking routeI 2018.05.30 08:47:06 - Checking DNS! 2018.05.30 08:47:20 - Connected.. 2018.05.30 08:47:20 - OpenVPN > Initialization Sequence Completed. 2018.05.30 08:49:29 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 08:49:29 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 08:49:29 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 08:49:29 - Disconnecting. 2018.05.30 08:49:29 - Sending management termination signal. 2018.05.30 08:49:29 - Management - Send 'signal SIGTERM'. 2018.05.30 08:49:29 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 08:49:29 - Connection terminated.. 2018.05.30 08:49:29 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 08:49:29 - DNS leak protection with packet filtering disabled.. 2018.05.30 08:49:29 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 08:49:29 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 08:49:32 - Checking authorization ...! 2018.05.30 08:49:32 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 08:49:33 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 08:49:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 08:49:33 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 08:49:33 - Connection to OpenVPN Management Interface. 2018.05.30 08:49:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 08:49:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:49:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:49:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 08:49:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 08:49:33 - OpenVPN > UDP link local: (not bound). 2018.05.30 08:49:33 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 08:49:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 08:49:33 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=bc92024f cf124937. 2018.05.30 08:49:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 08:49:33 - OpenVPN > VERIFY KU OK. 2018.05.30 08:49:33 - OpenVPN > Validating certificate extended key usage. 2018.05.30 08:49:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 08:49:33 - OpenVPN > VERIFY EKU OK. 2018.05.30 08:49:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 08:49:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 08:49:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 08:49:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 08:49:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 08:49:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 08:49:34 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 08:49:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 08:49:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 08:49:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 08:49:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 08:49:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:49:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:49:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 08:49:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 08:49:34 - OpenVPN > interactive service msg_channel=0. 2018.05.30 08:49:34 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 08:49:34 - OpenVPN > open_tun. 2018.05.30 08:49:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 08:49:34 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 08:49:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 08:49:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 08:49:34 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 08:49:34 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 08:49:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 08:49:39 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 08:49:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 08:49:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:49:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:49:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:49:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:49:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 08:49:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 08:49:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 08:49:39 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 08:49:39 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 08:49:39 - DNS leak protection with packet filtering enabled.. 2018.05.30 08:49:39 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 08:49:39 - Flushing DNSI 2018.05.30 08:49:42 - Checking routeI 2018.05.30 08:49:42 - Checking DNS! 2018.05.30 08:49:55 - Connected.. 2018.05.30 08:49:55 - OpenVPN > Initialization Sequence Completed. 2018.05.30 08:54:25 - Updating systems & servers data .... 2018.05.30 08:54:27 - Systems & servers data update completed. 2018.05.30 09:05:25 - Updating systems & servers data .... 2018.05.30 09:05:28 - Systems & servers data update completed. 2018.05.30 09:16:25 - Updating systems & servers data .... 2018.05.30 09:16:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 09:16:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 09:16:52 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 09:16:52 - Disconnecting. 2018.05.30 09:16:52 - Sending management termination signal. 2018.05.30 09:16:52 - Management - Send 'signal SIGTERM'. 2018.05.30 09:16:52 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 09:16:52 - Connection terminated.. 2018.05.30 09:16:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 09:16:52 - DNS leak protection with packet filtering disabled.. 2018.05.30 09:16:52 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 09:16:52 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.05.30 09:16:53 - Systems & servers data update completedI 2018.05.30 09:16:59 - Checking authorization ...! 2018.05.30 09:17:00 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 09:17:00 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 09:17:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 09:17:00 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 09:17:00 - Connection to OpenVPN Management Interface. 2018.05.30 09:17:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 09:17:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:17:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:17:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 09:17:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 09:17:00 - OpenVPN > UDP link local: (not bound). 2018.05.30 09:17:00 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 09:17:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 09:17:00 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=bfa0dce4 8df60c3f. 2018.05.30 09:17:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 09:17:00 - OpenVPN > VERIFY KU OK. 2018.05.30 09:17:00 - OpenVPN > Validating certificate extended key usage. 2018.05.30 09:17:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 09:17:00 - OpenVPN > VERIFY EKU OK. 2018.05.30 09:17:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 09:17:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 09:17:00 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 09:17:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 09:17:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 09:17:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 09:17:01 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 09:17:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 09:17:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 09:17:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 09:17:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 09:17:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:17:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:17:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:17:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:17:01 - OpenVPN > interactive service msg_channel=0. 2018.05.30 09:17:01 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 09:17:01 - OpenVPN > open_tun. 2018.05.30 09:17:02 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 09:17:02 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 09:17:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 09:17:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 09:17:02 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 09:17:02 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 09:17:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 09:17:06 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 09:17:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 09:17:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:17:07 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:17:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:17:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:17:07 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:17:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:17:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:17:07 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 09:17:07 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 09:17:07 - DNS leak protection with packet filtering enabled.. 2018.05.30 09:17:07 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 09:17:07 - Flushing DNSI 2018.05.30 09:17:10 - Checking routeI 2018.05.30 09:17:12 - Checking DNS! 2018.05.30 09:17:25 - Connected.. 2018.05.30 09:17:25 - OpenVPN > Initialization Sequence Completed. 2018.05.30 09:26:15 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 09:26:15 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 09:26:15 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 09:26:15 - Disconnecting. 2018.05.30 09:26:15 - Sending management termination signal. 2018.05.30 09:26:15 - Management - Send 'signal SIGTERM'. 2018.05.30 09:26:15 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 09:26:15 - Connection terminated.. 2018.05.30 09:26:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 09:26:15 - DNS leak protection with packet filtering disabled.. 2018.05.30 09:26:15 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 09:26:15 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 09:26:18 - Checking authorization ...! 2018.05.30 09:26:19 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 09:26:19 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 09:26:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 09:26:19 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 09:26:19 - Connection to OpenVPN Management Interface. 2018.05.30 09:26:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 09:26:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:26:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:26:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 09:26:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 09:26:19 - OpenVPN > UDP link local: (not bound). 2018.05.30 09:26:19 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 09:26:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 09:26:19 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=4981c59e 20fd1991. 2018.05.30 09:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 09:26:19 - OpenVPN > VERIFY KU OK. 2018.05.30 09:26:19 - OpenVPN > Validating certificate extended key usage. 2018.05.30 09:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 09:26:19 - OpenVPN > VERIFY EKU OK. 2018.05.30 09:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 09:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 09:26:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 09:26:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 09:26:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 09:26:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 09:26:20 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 09:26:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 09:26:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 09:26:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 09:26:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 09:26:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:26:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:26:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:26:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:26:20 - OpenVPN > interactive service msg_channel=0. 2018.05.30 09:26:20 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 09:26:20 - OpenVPN > open_tun. 2018.05.30 09:26:20 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 09:26:20 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 09:26:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 09:26:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 09:26:21 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 09:26:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 09:26:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 09:26:25 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 09:26:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 09:26:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:26:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:26:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:26:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:26:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:26:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:26:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:26:25 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 09:26:25 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 09:26:25 - DNS leak protection with packet filtering enabled.. 2018.05.30 09:26:25 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 09:26:25 - Flushing DNSI 2018.05.30 09:26:28 - Checking routeI 2018.05.30 09:26:29 - Checking DNS! 2018.05.30 09:26:41 - Connected.. 2018.05.30 09:26:41 - OpenVPN > Initialization Sequence Completed. 2018.05.30 09:26:46 - Updating systems & servers data .... 2018.05.30 09:26:46 - Systems & servers data update completed. 2018.05.30 09:36:17 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 09:36:17 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 09:36:17 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 09:36:17 - Disconnecting. 2018.05.30 09:36:17 - Sending management termination signal. 2018.05.30 09:36:17 - Management - Send 'signal SIGTERM'. 2018.05.30 09:36:17 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 09:36:18 - Connection terminated.. 2018.05.30 09:36:18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 09:36:18 - DNS leak protection with packet filtering disabled.. 2018.05.30 09:36:18 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 09:36:18 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 09:36:26 - Checking authorization ...! 2018.05.30 09:36:26 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 09:36:26 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 09:36:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 09:36:26 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 09:36:26 - Connection to OpenVPN Management Interface. 2018.05.30 09:36:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 09:36:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:36:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:36:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 09:36:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 09:36:27 - OpenVPN > UDP link local: (not bound). 2018.05.30 09:36:27 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 09:36:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 09:36:27 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=acca2fed 7abbd008. 2018.05.30 09:36:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 09:36:27 - OpenVPN > VERIFY KU OK. 2018.05.30 09:36:27 - OpenVPN > Validating certificate extended key usage. 2018.05.30 09:36:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 09:36:27 - OpenVPN > VERIFY EKU OK. 2018.05.30 09:36:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 09:36:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 09:36:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 09:36:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 09:36:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 09:36:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 09:36:28 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 09:36:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 09:36:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 09:36:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 09:36:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 09:36:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:36:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:36:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:36:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:36:28 - OpenVPN > interactive service msg_channel=0. 2018.05.30 09:36:28 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 09:36:28 - OpenVPN > open_tun. 2018.05.30 09:36:28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 09:36:28 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 09:36:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 09:36:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 09:36:28 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 09:36:28 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 09:36:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 09:36:33 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 09:36:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 09:36:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:36:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:36:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:36:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:36:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:36:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:36:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:36:33 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 09:36:33 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 09:36:33 - DNS leak protection with packet filtering enabled.. 2018.05.30 09:36:33 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 09:36:33 - Flushing DNSI 2018.05.30 09:36:37 - Checking routeI 2018.05.30 09:36:37 - Checking DNS! 2018.05.30 09:36:49 - Connected.. 2018.05.30 09:36:49 - OpenVPN > Initialization Sequence Completed. 2018.05.30 09:37:44 - Updating systems & servers data .... 2018.05.30 09:37:47 - Systems & servers data update completed. 2018.05.30 09:48:44 - Updating systems & servers data .... 2018.05.30 09:48:47 - Systems & servers data update completed. 2018.05.30 09:57:02 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 09:57:02 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 09:57:02 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 09:57:02 - Disconnecting. 2018.05.30 09:57:02 - Sending management termination signal. 2018.05.30 09:57:02 - Management - Send 'signal SIGTERM'. 2018.05.30 09:57:02 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 09:57:03 - Connection terminated.. 2018.05.30 09:57:03 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 09:57:03 - DNS leak protection with packet filtering disabled.. 2018.05.30 09:57:03 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 09:57:03 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 09:57:08 - Checking authorization ...! 2018.05.30 09:57:08 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 09:57:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 09:57:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 09:57:08 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 09:57:08 - Connection to OpenVPN Management Interface. 2018.05.30 09:57:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 09:57:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:57:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:57:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 09:57:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 09:57:08 - OpenVPN > UDP link local: (not bound). 2018.05.30 09:57:08 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 09:57:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 09:57:08 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=a927fc35 8816b0da. 2018.05.30 09:57:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 09:57:08 - OpenVPN > VERIFY KU OK. 2018.05.30 09:57:08 - OpenVPN > Validating certificate extended key usage. 2018.05.30 09:57:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 09:57:08 - OpenVPN > VERIFY EKU OK. 2018.05.30 09:57:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 09:57:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 09:57:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 09:57:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 09:57:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 09:57:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 09:57:10 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 09:57:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 09:57:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 09:57:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 09:57:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 09:57:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:57:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:57:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 09:57:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 09:57:10 - OpenVPN > interactive service msg_channel=0. 2018.05.30 09:57:10 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 09:57:10 - OpenVPN > open_tun. 2018.05.30 09:57:10 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 09:57:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 09:57:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 09:57:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 09:57:10 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 09:57:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 09:57:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 09:57:16 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 09:57:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 09:57:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:57:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:57:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:57:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:57:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 09:57:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 09:57:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 09:57:16 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 09:57:16 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 09:57:16 - DNS leak protection with packet filtering enabled.. 2018.05.30 09:57:16 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 09:57:16 - Flushing DNSI 2018.05.30 09:57:19 - Checking routeI 2018.05.30 09:57:19 - Checking DNS! 2018.05.30 09:57:32 - Connected.. 2018.05.30 09:57:32 - OpenVPN > Initialization Sequence Completed. 2018.05.30 09:59:48 - Updating systems & servers data .... 2018.05.30 09:59:50 - Systems & servers data update completed. 2018.05.30 10:10:49 - Updating systems & servers data .... 2018.05.30 10:10:51 - Systems & servers data update completed. 2018.05.30 10:21:50 - Updating systems & servers data .... 2018.05.30 10:21:51 - Systems & servers data update completed. 2018.05.30 10:26:17 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 10:26:17 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 10:26:17 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 10:26:17 - Disconnecting. 2018.05.30 10:26:17 - Sending management termination signal. 2018.05.30 10:26:17 - Management - Send 'signal SIGTERM'. 2018.05.30 10:26:17 - Connection terminated.. 2018.05.30 10:26:18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 10:26:18 - DNS leak protection with packet filtering disabled.. 2018.05.30 10:26:18 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 10:26:18 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 10:26:25 - Checking authorization ...! 2018.05.30 10:26:25 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 10:26:25 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 10:26:25 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 10:26:25 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 10:26:25 - Connection to OpenVPN Management Interface. 2018.05.30 10:26:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 10:26:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 10:26:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 10:26:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 10:26:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 10:26:26 - OpenVPN > UDP link local: (not bound). 2018.05.30 10:26:26 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 10:26:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 10:26:26 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=c957b230 f80de88a. 2018.05.30 10:26:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 10:26:26 - OpenVPN > VERIFY KU OK. 2018.05.30 10:26:26 - OpenVPN > Validating certificate extended key usage. 2018.05.30 10:26:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 10:26:26 - OpenVPN > VERIFY EKU OK. 2018.05.30 10:26:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 10:26:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 10:26:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 10:26:26 - OpenVPN > Key [AF_INET]89.249.74.212:443 [0] not initialized (yet), dropping packet.. 2018.05.30 10:26:27 - Above log line repeated 2 times more. 2018.05.30 10:26:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 10:26:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 10:26:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 10:26:27 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 10:26:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 10:26:27 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 10:26:27 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 10:26:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 10:26:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 10:26:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 10:26:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 10:26:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 10:26:27 - OpenVPN > interactive service msg_channel=0. 2018.05.30 10:26:27 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 10:26:27 - OpenVPN > open_tun. 2018.05.30 10:26:27 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 10:26:27 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 10:26:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 10:26:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 10:26:27 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 10:26:27 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 10:26:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 10:26:32 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 10:26:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 10:26:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 10:26:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 10:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 10:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 10:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 10:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 10:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 10:26:33 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 10:26:33 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 10:26:33 - DNS leak protection with packet filtering enabled.. 2018.05.30 10:26:33 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 10:26:33 - Flushing DNSI 2018.05.30 10:26:36 - Checking routeI 2018.05.30 10:26:40 - Checking DNS! 2018.05.30 10:26:54 - Connected.. 2018.05.30 10:26:54 - OpenVPN > Initialization Sequence Completed. 2018.05.30 10:31:53 - Updating systems & servers data .... 2018.05.30 10:31:56 - Systems & servers data update completed. 2018.05.30 10:42:56 - Updating systems & servers data .... 2018.05.30 10:42:56 - Systems & servers data update completed. 2018.05.30 10:53:57 - Updating systems & servers data .... 2018.05.30 10:53:59 - Systems & servers data update completed. 2018.05.30 11:04:56 - Updating systems & servers data .... 2018.05.30 11:05:00 - Systems & servers data update completed. 2018.05.30 11:16:00 - Updating systems & servers data .... 2018.05.30 11:16:57 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 11:16:57 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 11:16:57 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 11:16:57 - Disconnecting. 2018.05.30 11:16:57 - Sending management termination signal. 2018.05.30 11:16:57 - Management - Send 'signal SIGTERM'. 2018.05.30 11:16:57 - Connection terminated.. 2018.05.30 11:16:58 - Systems & servers data update completed. 2018.05.30 11:16:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 11:16:58 - DNS leak protection with packet filtering disabled.. 2018.05.30 11:16:58 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 11:16:58 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 11:17:06 - Checking authorization ...! 2018.05.30 11:17:06 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 11:17:07 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 11:17:07 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 11:17:07 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 11:17:07 - Connection to OpenVPN Management Interface. 2018.05.30 11:17:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 11:17:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:17:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:17:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 11:17:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 11:17:07 - OpenVPN > UDP link local: (not bound). 2018.05.30 11:17:07 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 11:17:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 11:17:07 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=6dbe604b 45d4229a. 2018.05.30 11:17:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 11:17:07 - OpenVPN > VERIFY KU OK. 2018.05.30 11:17:07 - OpenVPN > Validating certificate extended key usage. 2018.05.30 11:17:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 11:17:07 - OpenVPN > VERIFY EKU OK. 2018.05.30 11:17:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 11:17:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 11:17:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 11:17:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 11:17:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 11:17:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 11:17:09 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 11:17:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 11:17:09 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 11:17:09 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 11:17:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 11:17:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 11:17:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:17:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 11:17:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:17:09 - OpenVPN > interactive service msg_channel=0. 2018.05.30 11:17:09 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 11:17:09 - OpenVPN > open_tun. 2018.05.30 11:17:09 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 11:17:09 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 11:17:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 11:17:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 11:17:09 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 11:17:09 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 11:17:14 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 11:17:14 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 11:17:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 11:17:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 11:17:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 11:17:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 11:17:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 11:17:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 11:17:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 11:17:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 11:17:14 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 11:17:14 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 11:17:14 - DNS leak protection with packet filtering enabled.. 2018.05.30 11:17:14 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 11:17:14 - Flushing DNSI 2018.05.30 11:17:17 - Checking routeI 2018.05.30 11:17:20 - Checking DNS! 2018.05.30 11:17:35 - Connected.. 2018.05.30 11:17:35 - OpenVPN > Initialization Sequence Completed. 2018.05.30 11:26:51 - Updating systems & servers data .... 2018.05.30 11:26:54 - Systems & servers data update completed. 2018.05.30 11:37:51 - Updating systems & servers data .... 2018.05.30 11:37:54 - Systems & servers data update completed. 2018.05.30 11:48:51 - Updating systems & servers data .... 2018.05.30 11:48:54 - Systems & servers data update completed. 2018.05.30 11:56:58 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.05.30 11:56:58 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.05.30 11:56:58 - OpenVPN > Restart pause, 5 second(s)! 2018.05.30 11:56:58 - Disconnecting. 2018.05.30 11:56:58 - Sending management termination signal. 2018.05.30 11:56:58 - Management - Send 'signal SIGTERM'. 2018.05.30 11:56:58 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.05.30 11:56:58 - Connection terminated.. 2018.05.30 11:56:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.05.30 11:56:58 - DNS leak protection with packet filtering disabled.. 2018.05.30 11:56:58 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.05.30 11:56:58 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.05.30 11:57:03 - Checking authorization ...! 2018.05.30 11:57:03 - Connecting to Asterope (United Kingdom, Manchester). 2018.05.30 11:57:03 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.05.30 11:57:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.05.30 11:57:03 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.30 11:57:03 - Connection to OpenVPN Management Interface. 2018.05.30 11:57:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.30 11:57:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:57:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:57:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.05.30 11:57:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.05.30 11:57:03 - OpenVPN > UDP link local: (not bound). 2018.05.30 11:57:03 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.05.30 11:57:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.30 11:57:03 - OpenVPN > TLS: Initial packet from [AF_INET]89.249.74.212:443, sid=8eeff232 922baf81. 2018.05.30 11:57:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.30 11:57:03 - OpenVPN > VERIFY KU OK. 2018.05.30 11:57:03 - OpenVPN > Validating certificate extended key usage. 2018.05.30 11:57:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.30 11:57:03 - OpenVPN > VERIFY EKU OK. 2018.05.30 11:57:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.30 11:57:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.30 11:57:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]89.249.74.212:443. 2018.05.30 11:57:04 - OpenVPN > Key [AF_INET]89.249.74.212:443 [0] not initialized (yet), dropping packet.. 2018.05.30 11:57:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.30 11:57:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.163 255.255.0.0'. 2018.05.30 11:57:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.30 11:57:05 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.30 11:57:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.30 11:57:05 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.30 11:57:05 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.30 11:57:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.30 11:57:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 11:57:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:57:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.30 11:57:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.30 11:57:05 - OpenVPN > interactive service msg_channel=0. 2018.05.30 11:57:05 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=ec:0e:c4:12:4a:51. 2018.05.30 11:57:05 - OpenVPN > open_tun. 2018.05.30 11:57:05 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E93B268-238B-423A-83DD-07643C6FB465}.tap. 2018.05.30 11:57:05 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.05.30 11:57:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.163/255.255.0.0 [sUCCEEDED]. 2018.05.30 11:57:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.163/255.255.0.0 on interface {4E93B268-238B-423A-83DD-07643C6FB465} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.05.30 11:57:05 - OpenVPN > Successful ARP Flush on interface [35] {4E93B268-238B-423A-83DD-07643C6FB465}. 2018.05.30 11:57:05 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.30 11:57:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.05.30 11:57:10 - OpenVPN > C:\Windows\system32\route.exe ADD 89.249.74.212 MASK 255.255.255.255 192.168.0.1. 2018.05.30 11:57:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.05.30 11:57:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 11:57:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 11:57:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 11:57:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 11:57:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.05.30 11:57:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.05.30 11:57:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.05.30 11:57:11 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.05.30 11:57:11 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.05.30 11:57:11 - DNS leak protection with packet filtering enabled.. 2018.05.30 11:57:11 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.05.30 11:57:11 - Flushing DNSI 2018.05.30 11:57:14 - Checking routeI 2018.05.30 11:57:14 - Checking DNS! 2018.05.30 11:57:27 - Connected.. 2018.05.30 11:57:27 - OpenVPN > Initialization Sequence Completed. 2018.05.30 11:59:52 - Updating systems & servers data .... 2018.05.30 11:59:53 - Systems & servers data update completed Quote Share this post Link to post
go558a83nk 364 Posted ... Well, the first thing to try is TCP instead of UDP to see if that fixes it. Quote Share this post Link to post
after_lunch 4 Posted ... I am now almost certain that this was an ISP problem. When I visited the Virgin Media (my ISP) Help Forums, just in case, I found a number of threads with many recent complaints about frequent, short, internet service dropouts. I tried to test this by running one PC with Eddie, the other “unprotected”. Whenever I noticed that an Eddie PC download had paused, I tried to load a new page on the “unprotected” PC and found that I had no internet service on the “unprotected” PC. It is possible I failed to notice a few dropouts, but this was enough to convince me to stop worrying about Eddie and start worrying about my ISP (which has a fibre monopoly in my area). And then, as if by magic, the problem cleared up yesterday afternoon, and apart from a couple of blips, normal service seems to have been resumed. It looks like go558a83nk was spot on with his original comment: “That sort of inactivity is not what causes disconnects. Something is causing the tunnel to not be able to send/receive data at all.” – that something being my ISP! Quote Share this post Link to post