Shadow101 0 Posted ... Dear All, I am running AirVPN on Windows 10. Everything was working perfectly until I updated to version 2.14.5. I have tried uninstalling the 2.14.5 and reinstalling the 2.13.6 but this was not effective.Interestingly when I installed 2.14.5 without uninstalling 2.13.6 (upgraded) I have the problem below.However when I uninstalled 2.13.6 and then fresh installed 2.14.5 I could not access the internet at all. AirVPN would connect (with network lock) and the internet was not available at all.I therefore had to uninstall 2.14.5. Then reinstall 2.13.6. Then install 2.14.5 again without installing 2.14.5 (upgrading it). This allows me to have internet access intermittently but with the following loop.Every so often (it seems to be at random intervals). The internet goes off. When I check Eddie. It says "disconnecting" from whatever server I'm on. This disconnecting remains. The log shows a loop with: Sending management termination signal2018.06.18 21:25:40 - Management - Send 'signal SIGTERM'Sending management termination signal2018.06.18 21:25:40 - Management - Send 'signal SIGTERM'Sending management termination signal2018.06.18 21:25:40 - Management - Send 'signal SIGTERM' This just goes on repeating over and over. The main screen remains stuck on "Disconnecting". I am forced to close AirVPN. It will not respond and I have to use Task Manager to close it. AirVPN seemingly closes, and does not appear in the system tray or task manager anymore. However, the internet remains locked. I have disabled all firewalls but this has no effect. I am forced to restart the computer. When I do this things start again, until the next random time the loop begins. It is worth noting that if I disable Network Lock that things seem to connect fine without a problem. Obviously this is get around but I would like the network lock to be in place. Please find my logs below and any help would be very much appreciated! System Logs:. 2018.06.18 21:51:41 - Eddie version: 2.14.5 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.06.18 21:51:41 - Reading options from C:\Users\Home\AppData\Local\AirVPN\AirVPN.xml. 2018.06.18 21:51:42 - Command line arguments (1): path="home". 2018.06.18 21:51:49 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2018.06.18 21:51:49 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.06.18 21:51:49 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.06.18 21:51:49 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.06.18 21:51:49 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.06.18 21:51:50 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pemW 2018.06.18 21:52:06 - Recovery. Unexpected crash?. 2018.06.18 21:52:09 - Routes, remove 94.229.74.91 for gateway 10.4.0.1 failed: The route deletion failed: Element not found. 2018.06.18 21:52:10 - DNS IPv4 of a network adapter restored to original settings (AirVPN, to 10.17.172.1)! 2018.06.18 21:52:10 - Deactivation of Network Lock! 2018.06.18 21:52:12 - Activation of Network Lock - Windows Filtering Platform. 2018.06.18 21:52:13 - Updating systems & servers data ...I 2018.06.18 21:52:15 - Ready. 2018.06.18 21:52:19 - Cannot retrieve systems & servers data. (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)I 2018.06.18 21:52:37 - Session starting.I 2018.06.18 21:52:37 - Checking authorization ...W 2018.06.18 21:52:38 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)! 2018.06.18 21:52:38 - Connecting to Asterope (United Kingdom, Manchester). 2018.06.18 21:52:38 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:52:38 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:52:38 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:52:38 - Connection to OpenVPN Management Interface. 2018.06.18 21:52:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:52:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:52:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:52:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.06.18 21:52:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:52:38 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:52:38 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.06.18 21:52:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:52:40 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:53:10 - Above log line repeated 3 times more. 2018.06.18 21:53:10 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.18 21:53:10 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:53:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.18 21:53:15 - Disconnecting. 2018.06.18 21:53:15 - Connection terminated.I 2018.06.18 21:53:18 - Checking authorization ...W 2018.06.18 21:53:19 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)! 2018.06.18 21:53:19 - Connecting to Asterope (United Kingdom, Manchester). 2018.06.18 21:53:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:53:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:53:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:53:19 - Connection to OpenVPN Management Interface. 2018.06.18 21:53:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:53:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:53:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:53:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.06.18 21:53:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:53:19 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:53:19 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.06.18 21:53:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:53:21 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:53:51 - Above log line repeated 3 times more. 2018.06.18 21:53:51 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.18 21:53:51 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:53:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.18 21:53:56 - Disconnecting. 2018.06.18 21:53:56 - Connection terminated.I 2018.06.18 21:53:59 - Checking authorization ...W 2018.06.18 21:54:00 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)! 2018.06.18 21:54:00 - Connecting to Asterope (United Kingdom, Manchester). 2018.06.18 21:54:00 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:54:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:54:00 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:54:00 - Connection to OpenVPN Management Interface. 2018.06.18 21:54:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:54:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:54:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:54:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.06.18 21:54:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:54:00 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:54:00 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.06.18 21:54:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:54:02 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:54:32 - Above log line repeated 2 times more. 2018.06.18 21:54:32 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.18 21:54:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:54:32 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:54:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.18 21:54:37 - Disconnecting. 2018.06.18 21:54:37 - Connection terminated.I 2018.06.18 21:54:40 - Checking authorization ...W 2018.06.18 21:54:40 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)! 2018.06.18 21:54:40 - Connecting to Asterope (United Kingdom, Manchester). 2018.06.18 21:54:40 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:54:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:54:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:54:40 - Connection to OpenVPN Management Interface. 2018.06.18 21:54:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:54:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:54:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:54:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.06.18 21:54:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:54:40 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:54:40 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.06.18 21:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:54:42 - OpenVPN > write UDP: Unknown error (code=10051)! 2018.06.18 21:54:45 - Disconnecting. 2018.06.18 21:54:45 - Sending management termination signal. 2018.06.18 21:54:45 - Management - Send 'signal SIGTERM'. 2018.06.18 21:54:45 - OpenVpn Management > ENTER PASSWORD:. 2018.06.18 21:54:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.18 21:54:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:54:46 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:54:51 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.18 21:54:51 - Connection terminated.I 2018.06.18 21:54:51 - Cancel requested.! 2018.06.18 21:54:51 - Session terminated.I 2018.06.18 21:54:57 - Session starting.I 2018.06.18 21:54:58 - Checking authorization ...W 2018.06.18 21:54:58 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable). 2018.06.18 21:54:58 - IPv6 disabled with packet filtering.! 2018.06.18 21:54:58 - Connecting to Betelgeuse (United Kingdom, Maidenhead). 2018.06.18 21:54:59 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:54:59 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:54:59 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:54:59 - Connection to OpenVPN Management Interface. 2018.06.18 21:54:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:54:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:54:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:54:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.134:443. 2018.06.18 21:54:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:54:59 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:54:59 - OpenVPN > UDP link remote: [AF_INET]185.103.96.134:443. 2018.06.18 21:54:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:55:00 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:55:30 - Above log line repeated 3 times more. 2018.06.18 21:55:30 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.18 21:55:30 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:55:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.18 21:55:35 - Disconnecting. 2018.06.18 21:55:35 - Connection terminated.. 2018.06.18 21:55:35 - IPv6 restored with packet filtering.I 2018.06.18 21:55:38 - Checking authorization ...W 2018.06.18 21:55:39 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)! 2018.06.18 21:55:39 - Connecting to Asterope (United Kingdom, Manchester). 2018.06.18 21:55:40 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:55:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:55:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:55:40 - Connection to OpenVPN Management Interface. 2018.06.18 21:55:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:55:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:55:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:55:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.06.18 21:55:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:55:40 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:55:40 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.06.18 21:55:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:55:42 - OpenVPN > write UDP: Unknown error (code=10051)! 2018.06.18 21:55:45 - Disconnecting. 2018.06.18 21:55:45 - Sending management termination signal. 2018.06.18 21:55:45 - Management - Send 'signal SIGTERM'. 2018.06.18 21:55:45 - OpenVpn Management > ENTER PASSWORD:. 2018.06.18 21:55:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.18 21:55:45 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:55:47 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:55:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.18 21:55:50 - Connection terminated.I 2018.06.18 21:55:50 - Cancel requested.! 2018.06.18 21:55:50 - Session terminated.I 2018.06.18 21:55:52 - Session starting.I 2018.06.18 21:55:53 - Checking authorization ...W 2018.06.18 21:55:53 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)! 2018.06.18 21:55:53 - Connecting to Minkar (United Kingdom, Maidenhead). 2018.06.18 21:55:54 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:55:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:55:54 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:55:54 - Connection to OpenVPN Management Interface. 2018.06.18 21:55:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:55:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:55:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:55:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.130:443. 2018.06.18 21:55:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:55:54 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:55:54 - OpenVPN > UDP link remote: [AF_INET]185.103.96.130:443. 2018.06.18 21:55:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:55:55 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:56:25 - Above log line repeated 3 times more. 2018.06.18 21:56:25 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.18 21:56:25 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:56:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.18 21:56:30 - Disconnecting. 2018.06.18 21:56:30 - Connection terminated.I 2018.06.18 21:56:33 - Checking authorization ...W 2018.06.18 21:56:34 - Authorization check failed, continue anyway (curl: (7) Failed to connect to 52.48.66.85 port 80: Network unreachable)! 2018.06.18 21:56:34 - Connecting to Asterope (United Kingdom, Manchester). 2018.06.18 21:56:34 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:56:34 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:56:34 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:56:34 - Connection to OpenVPN Management Interface. 2018.06.18 21:56:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:56:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:56:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:56:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]89.249.74.212:443. 2018.06.18 21:56:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:56:34 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:56:34 - OpenVPN > UDP link remote: [AF_INET]89.249.74.212:443. 2018.06.18 21:56:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:56:36 - OpenVPN > write UDP: Unknown error (code=10051). 2018.06.18 21:56:43 - Above log line repeated 1 times more! 2018.06.18 21:56:43 - Disconnecting. 2018.06.18 21:56:43 - Sending management termination signal. 2018.06.18 21:56:43 - Management - Send 'signal SIGTERM'. 2018.06.18 21:56:43 - OpenVpn Management > ENTER PASSWORD:. 2018.06.18 21:56:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.18 21:56:43 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:56:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.18 21:56:48 - Connection terminated.I 2018.06.18 21:56:48 - Cancel requested.! 2018.06.18 21:56:48 - Session terminated.! 2018.06.18 21:57:08 - Deactivation of Network LockI 2018.06.18 21:57:44 - Session starting.I 2018.06.18 21:57:44 - Checking authorization .... 2018.06.18 21:57:45 - IPv6 disabled with packet filtering.! 2018.06.18 21:57:45 - Connecting to Kitel (United Kingdom, Maidenhead). 2018.06.18 21:57:45 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:57:45 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:57:45 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:57:45 - Connection to OpenVPN Management Interface. 2018.06.18 21:57:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:57:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:57:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:57:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.131:443. 2018.06.18 21:57:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:57:45 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:57:45 - OpenVPN > UDP link remote: [AF_INET]185.103.96.131:443. 2018.06.18 21:57:45 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.131:443, sid=da01efbc 85b65dd5. 2018.06.18 21:57:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.18 21:57:45 - OpenVPN > VERIFY KU OK. 2018.06.18 21:57:45 - OpenVPN > Validating certificate extended key usage. 2018.06.18 21:57:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.18 21:57:45 - OpenVPN > VERIFY EKU OK. 2018.06.18 21:57:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.18 21:57:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:57:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.18 21:57:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.131:443. 2018.06.18 21:57:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.18 21:57:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.13 255.255.0.0'. 2018.06.18 21:57:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.18 21:57:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.18 21:57:46 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.18 21:57:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.18 21:57:46 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.18 21:57:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.18 21:57:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.18 21:57:46 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:57:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.18 21:57:46 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:57:46 - OpenVPN > interactive service msg_channel=0. 2018.06.18 21:57:46 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=12 HWADDR=10:f0:05:04:ef:d4. 2018.06.18 21:57:46 - OpenVPN > open_tun. 2018.06.18 21:57:47 - OpenVPN > TAP-WIN32 device [AirVPN] opened: \\.\Global\{C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7}.tap. 2018.06.18 21:57:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.18 21:57:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.13/255.255.0.0 [sUCCEEDED]. 2018.06.18 21:57:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.13/255.255.0.0 on interface {C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.18 21:57:47 - OpenVPN > Successful ARP Flush on interface [20] {C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7}. 2018.06.18 21:57:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.18 21:57:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.18 21:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 185.103.96.131 MASK 255.255.255.255 192.168.0.1. 2018.06.18 21:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.06.18 21:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.18 21:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.18 21:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.18 21:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.18 21:57:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.18 21:57:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.18 21:57:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.18 21:57:52 - Interface AirVPN metric changed from Automatic to 3, layer IPv4. 2018.06.18 21:57:52 - Interface AirVPN metric changed from Automatic to 3, layer IPv6. 2018.06.18 21:57:52 - DNS leak protection with packet filtering enabled.. 2018.06.18 21:57:53 - DNS IPv4 of a network adapter forced (AirVPN, from manual (10.17.172.1) to 10.4.0.1). 2018.06.18 21:57:54 - Routes, added a new route, 185.103.96.139 for gateway 10.4.0.1. 2018.06.18 21:57:54 - Flushing DNSI 2018.06.18 21:57:57 - Checking route IPv4I 2018.06.18 21:57:58 - Checking DNS. 2018.06.18 21:58:10 - Unexpected XML declaration. The XML declaration must be the first node in the document, and no white space characters are allowed to appear before it. Line 2, position 3.. 2018.06.18 21:58:10 - Checking DNS (2° try). 2018.06.18 21:58:24 - Unexpected XML declaration. The XML declaration must be the first node in the document, and no white space characters are allowed to appear before it. Line 2, position 3.. 2018.06.18 21:58:24 - Checking DNS (3° try). 2018.06.18 21:58:38 - Unexpected XML declaration. The XML declaration must be the first node in the document, and no white space characters are allowed to appear before it. Line 2, position 3.E 2018.06.18 21:58:38 - Checking DNS failed.. 2018.06.18 21:58:38 - OpenVPN > Initialization Sequence Completed! 2018.06.18 21:58:38 - Disconnecting. 2018.06.18 21:58:38 - Routes, removed a route previously added, 185.103.96.139 for gateway 10.4.0.1. 2018.06.18 21:58:38 - Sending management termination signal. 2018.06.18 21:58:38 - Management - Send 'signal SIGTERM'. 2018.06.18 21:58:38 - OpenVpn Management > ENTER PASSWORD:. 2018.06.18 21:58:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.18 21:58:38 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.18 21:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 185.103.96.131 MASK 255.255.255.255 192.168.0.1. 2018.06.18 21:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.18 21:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.18 21:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.18 21:58:43 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.18 21:58:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.18 21:58:43 - OpenVPN > Closing TUN/TAP interface. 2018.06.18 21:58:43 - OpenVPN > TAP: DHCP address released. 2018.06.18 21:58:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.18 21:58:44 - Connection terminated.. 2018.06.18 21:58:44 - IPv6 restored with packet filtering.. 2018.06.18 21:58:44 - DNS IPv4 of a network adapter restored to original settings (AirVPN, to 10.17.172.1). 2018.06.18 21:58:44 - DNS leak protection with packet filtering disabled.. 2018.06.18 21:58:44 - Interface AirVPN metric restored from 3 to Automatic, layer IPv4. 2018.06.18 21:58:44 - Interface AirVPN metric restored from 3 to Automatic, layer IPv6I 2018.06.18 21:58:47 - Checking authorization .... 2018.06.18 21:58:47 - IPv6 disabled with packet filtering.! 2018.06.18 21:58:47 - Connecting to Bellatrix (United Kingdom, London). 2018.06.18 21:58:48 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.18 21:58:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.18 21:58:48 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.18 21:58:48 - Connection to OpenVPN Management Interface. 2018.06.18 21:58:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.18 21:58:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:58:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.18 21:58:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]88.150.240.7:443. 2018.06.18 21:58:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.18 21:58:48 - OpenVPN > UDP link local: (not bound). 2018.06.18 21:58:48 - OpenVPN > UDP link remote: [AF_INET]88.150.240.7:443. 2018.06.18 21:58:48 - OpenVPN > TLS: Initial packet from [AF_INET]88.150.240.7:443, sid=15e80443 ba404f66. 2018.06.18 21:58:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.18 21:58:48 - OpenVPN > VERIFY KU OK. 2018.06.18 21:58:48 - OpenVPN > Validating certificate extended key usage. 2018.06.18 21:58:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.18 21:58:48 - OpenVPN > VERIFY EKU OK. 2018.06.18 21:58:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Bellatrix, emailAddress=info@airvpn.org. 2018.06.18 21:58:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.18 21:58:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.18 21:58:48 - OpenVPN > [bellatrix] Peer Connection Initiated with [AF_INET]88.150.240.7:443. 2018.06.18 21:58:49 - OpenVPN > SENT CONTROL [bellatrix]: 'PUSH_REQUEST' (status=1). 2018.06.18 21:58:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.150 255.255.0.0,peer-id 31,cipher AES-256-GCM'. 2018.06.18 21:58:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.18 21:58:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.18 21:58:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.18 21:58:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.18 21:58:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.18 21:58:49 - OpenVPN > interactive service msg_channel=0. 2018.06.18 21:58:49 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=12 HWADDR=10:f0:05:04:ef:d4. 2018.06.18 21:58:49 - OpenVPN > open_tun. 2018.06.18 21:58:49 - OpenVPN > TAP-WIN32 device [AirVPN] opened: \\.\Global\{C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7}.tap. 2018.06.18 21:58:49 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.18 21:58:49 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.150/255.255.0.0 [sUCCEEDED]. 2018.06.18 21:58:49 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.150/255.255.0.0 on interface {C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.18 21:58:49 - OpenVPN > Successful ARP Flush on interface [20] {C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7}. 2018.06.18 21:58:50 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.18 21:58:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.18 21:58:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 88.150.240.7 MASK 255.255.255.255 192.168.0.1. 2018.06.18 21:58:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.06.18 21:58:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.18 21:58:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.18 21:58:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.18 21:58:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.18 21:58:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.18 21:58:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.18 21:58:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.18 21:58:55 - Interface AirVPN metric changed from Automatic to 3, layer IPv4. 2018.06.18 21:58:55 - Interface AirVPN metric changed from Automatic to 3, layer IPv6. 2018.06.18 21:58:55 - DNS leak protection with packet filtering enabled.. 2018.06.18 21:58:56 - DNS IPv4 of a network adapter forced (AirVPN, from manual (10.17.172.1) to 10.4.0.1). 2018.06.18 21:58:56 - Routes, added a new route, 88.150.241.20 for gateway 10.4.0.1. 2018.06.18 21:58:56 - Flushing DNSI 2018.06.18 21:59:00 - Checking route IPv4I 2018.06.18 21:59:00 - Checking DNS! 2018.06.18 21:59:13 - Connected.. 2018.06.18 21:59:13 - OpenVPN > Initialization Sequence Completed. 2018.06.18 21:59:13 - OpenVpn Management > ENTER PASSWORD:. 2018.06.18 22:03:03 - Updating systems & servers data .... 2018.06.18 22:03:04 - Systems & servers data update completed. 2018.06.18 22:13:35 - Updating systems & servers data .... 2018.06.18 22:13:35 - Systems & servers data update completed. 2018.06.18 22:24:06 - Updating systems & servers data .... 2018.06.18 22:24:07 - Systems & servers data update completed. 2018.06.18 22:34:19 - Updating systems & servers data .... 2018.06.18 22:34:20 - Systems & servers data update completed. 2018.06.18 22:44:42 - Updating systems & servers data .... 2018.06.18 22:44:42 - Systems & servers data update completed. 2018.06.18 22:55:01 - Updating systems & servers data .... 2018.06.18 22:55:02 - Systems & servers data update completed. 2018.06.18 22:58:48 - OpenVPN > TLS: soft reset sec=0 bytes=66950615/-1 pkts=92885/0. 2018.06.18 22:58:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.18 22:58:48 - OpenVPN > VERIFY KU OK. 2018.06.18 22:58:48 - OpenVPN > Validating certificate extended key usage. 2018.06.18 22:58:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.18 22:58:48 - OpenVPN > VERIFY EKU OK. 2018.06.18 22:58:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Bellatrix, emailAddress=info@airvpn.org. 2018.06.18 22:58:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.18 22:58:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.18 22:58:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.18 23:05:16 - Updating systems & servers data .... 2018.06.18 23:05:17 - Systems & servers data update completed Example of Log from Loop:. 2018.06.18 21:18:30 - Sending management termination signal. 2018.06.18 21:18:30 - Management - Send 'signal SIGTERM'. 2018.06.18 21:18:40 - Sending management termination signal. 2018.06.18 21:18:40 - Management - Send 'signal SIGTERM'. 2018.06.18 21:18:50 - Sending management termination signal. 2018.06.18 21:18:50 - Management - Send 'signal SIGTERM'. 2018.06.18 21:19:00 - Sending management termination signal. 2018.06.18 21:19:00 - Management - Send 'signal SIGTERM'. 2018.06.18 21:19:10 - Sending management termination signal. 2018.06.18 21:19:10 - Management - Send 'signal SIGTERM'. 2018.06.18 21:19:20 - Sending management termination signal. 2018.06.18 21:19:20 - Management - Send 'signal SIGTERM'. 2018.06.18 21:19:30 - Sending management termination signal. 2018.06.18 21:19:30 - Management - Send 'signal SIGTERM'. 2018.06.18 21:19:40 - Sending management termination signal. 2018.06.18 21:19:40 - Management - Send 'signal SIGTERM' Quote Share this post Link to post
Guest Posted ... Uninstall Air completely, remove all files in C:\Users\Home\AppData\Local\AirVPN, such as the AirVPN.xml file and then start the client and see if that fixes your issue. The XML files change between versions so that can cause issues. Quote Share this post Link to post
Shadow101 0 Posted ... Thank you for the suggestion. I have tried this. It did not work. I completely uninstalled. Removed the files located C:\Users\Home\AppData\Local\AirVPN as suggested but still no dice. I have posted another log below. This time I manged to capture the point at which the loop began. I am not sure if this will help anymore. Interestingly when the loop started this time the network lock was not engaged. Despite this it still hung on "disconnecting". I tried to close Eddie but it would not respond. I used Task Manager to close it at which point the interface disappeared and it did not appear in Task Manager anymore. Windows then showed my Wifi as connected (and under troubleshooting) said I was connected to the internet. But I could not access any internet services (i.e. browsers could not use internet and file services such as dropbox could not connect). I am baffled as to how to proceed. If you or anyone has any other advice it'd be much appreciated. Everything was working swimmingly before this! Thanks again. . 2018.06.19 16:58:17 - Eddie version: 2.14.5 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.06.19 16:58:18 - Reading options from C:\Users\Home\AppData\Local\AirVPN\AirVPN.xml. 2018.06.19 16:58:18 - Command line arguments (1): path="home". 2018.06.19 16:58:30 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2018.06.19 16:58:30 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.06.19 16:58:30 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.06.19 16:58:30 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.06.19 16:58:30 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.06.19 16:58:30 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem. 2018.06.19 16:58:31 - Updating systems & servers data ...I 2018.06.19 16:58:31 - Session starting.. 2018.06.19 16:58:33 - Systems & servers data update completedI 2018.06.19 16:58:37 - Checking authorization .... 2018.06.19 16:58:37 - IPv6 disabled with packet filtering.! 2018.06.19 16:58:37 - Connecting to Algedi (United Kingdom, London). 2018.06.19 16:58:41 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.19 16:58:41 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.19 16:58:41 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.19 16:58:41 - Connection to OpenVPN Management Interface. 2018.06.19 16:58:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.19 16:58:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.19 16:58:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.19 16:58:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]80.84.49.4:443. 2018.06.19 16:58:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.19 16:58:41 - OpenVPN > UDP link local: (not bound). 2018.06.19 16:58:41 - OpenVPN > UDP link remote: [AF_INET]80.84.49.4:443. 2018.06.19 16:58:41 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=e3e50b1c 5cef045f. 2018.06.19 16:58:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 16:58:41 - OpenVPN > VERIFY KU OK. 2018.06.19 16:58:41 - OpenVPN > Validating certificate extended key usage. 2018.06.19 16:58:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 16:58:41 - OpenVPN > VERIFY EKU OK. 2018.06.19 16:58:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 16:58:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.19 16:58:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443. 2018.06.19 16:58:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.19 16:58:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.19 16:58:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.10.202 255.255.0.0,peer-id 40,cipher AES-256-GCM'. 2018.06.19 16:58:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.19 16:58:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.19 16:58:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.19 16:58:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 16:58:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 16:58:43 - OpenVPN > interactive service msg_channel=0. 2018.06.19 16:58:43 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=12 HWADDR=10:f0:05:04:ef:d4. 2018.06.19 16:58:43 - OpenVPN > open_tun. 2018.06.19 16:58:43 - OpenVPN > TAP-WIN32 device [AirVPN] opened: \\.\Global\{C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7}.tap. 2018.06.19 16:58:43 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.19 16:58:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.10.202/255.255.0.0 [sUCCEEDED]. 2018.06.19 16:58:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.10.202/255.255.0.0 on interface {C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.19 16:58:43 - OpenVPN > Successful ARP Flush on interface [20] {C7F1131B-0E9D-41D5-BA47-3DD6AEB273F7}. 2018.06.19 16:58:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.19 16:58:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.19 16:58:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.0.1. 2018.06.19 16:58:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.06.19 16:58:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.19 16:58:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.19 16:58:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.19 16:58:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.19 16:58:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.19 16:58:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.19 16:58:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.19 16:58:48 - Interface AirVPN metric changed from Automatic to 3, layer IPv4. 2018.06.19 16:58:51 - Interface AirVPN metric changed from Automatic to 3, layer IPv6. 2018.06.19 16:58:51 - DNS leak protection with packet filtering enabled.. 2018.06.19 16:59:04 - DNS IPv4 of a network adapter forced (AirVPN, from manual (10.17.172.1) to 10.4.0.1). 2018.06.19 16:59:05 - DNS IPv6 of a network adapter forced (AirVPN, from manual (fde6:7a:7d20:7cc::1) to ). 2018.06.19 16:59:06 - Routes, added a new route, 80.84.49.20 for gateway 10.4.0.1. 2018.06.19 16:59:06 - Flushing DNSI 2018.06.19 16:59:20 - Checking route IPv4I 2018.06.19 16:59:22 - Checking DNS! 2018.06.19 16:59:35 - Connected.. 2018.06.19 16:59:35 - OpenVPN > Initialization Sequence Completed. 2018.06.19 16:59:35 - OpenVpn Management > ENTER PASSWORD:. 2018.06.19 17:08:46 - Updating systems & servers data .... 2018.06.19 17:08:47 - Systems & servers data update completed. 2018.06.19 17:18:51 - Updating systems & servers data .... 2018.06.19 17:18:52 - Systems & servers data update completed. 2018.06.19 17:28:58 - Updating systems & servers data .... 2018.06.19 17:28:59 - Systems & servers data update completed. 2018.06.19 17:39:10 - Updating systems & servers data .... 2018.06.19 17:39:12 - Systems & servers data update completed. 2018.06.19 17:49:16 - Updating systems & servers data .... 2018.06.19 17:49:21 - Systems & servers data update completed. 2018.06.19 17:58:48 - OpenVPN > TLS: soft reset sec=0 bytes=41688966/-1 pkts=76108/0. 2018.06.19 17:58:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 17:58:58 - OpenVPN > VERIFY KU OK. 2018.06.19 17:58:58 - OpenVPN > Validating certificate extended key usage. 2018.06.19 17:58:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 17:58:58 - OpenVPN > VERIFY EKU OK. 2018.06.19 17:58:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 17:58:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 17:58:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 17:58:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.19 17:59:28 - Updating systems & servers data .... 2018.06.19 17:59:47 - Systems & servers data update completed. 2018.06.19 18:09:52 - Updating systems & servers data .... 2018.06.19 18:10:00 - Systems & servers data update completed. 2018.06.19 18:19:58 - Updating systems & servers data .... 2018.06.19 18:19:59 - Systems & servers data update completed. 2018.06.19 18:30:14 - Updating systems & servers data .... 2018.06.19 18:30:15 - Systems & servers data update completed. 2018.06.19 18:40:18 - Updating systems & servers data .... 2018.06.19 18:40:19 - Systems & servers data update completed. 2018.06.19 18:50:23 - Updating systems & servers data .... 2018.06.19 18:50:24 - Systems & servers data update completed. 2018.06.19 18:58:42 - Renewing TLS key. 2018.06.19 18:58:42 - OpenVPN > TLS: tls_process: killed expiring key. 2018.06.19 18:58:58 - OpenVPN > TLS: soft reset sec=0 bytes=21439409/-1 pkts=42375/0. 2018.06.19 18:58:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 18:58:58 - OpenVPN > VERIFY KU OK. 2018.06.19 18:58:58 - OpenVPN > Validating certificate extended key usage. 2018.06.19 18:58:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 18:58:58 - OpenVPN > VERIFY EKU OK. 2018.06.19 18:58:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 18:58:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 18:58:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 18:58:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.19 19:00:27 - Updating systems & servers data .... 2018.06.19 19:00:28 - Systems & servers data update completed. 2018.06.19 19:10:31 - Updating systems & servers data .... 2018.06.19 19:10:33 - Systems & servers data update completed. 2018.06.19 19:20:36 - Updating systems & servers data .... 2018.06.19 19:20:37 - Systems & servers data update completed. 2018.06.19 19:30:41 - Updating systems & servers data .... 2018.06.19 19:30:42 - Systems & servers data update completed. 2018.06.19 19:40:45 - Updating systems & servers data .... 2018.06.19 19:40:46 - Systems & servers data update completed. 2018.06.19 19:50:50 - Updating systems & servers data .... 2018.06.19 19:50:51 - Systems & servers data update completed. 2018.06.19 19:58:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 19:58:58 - OpenVPN > VERIFY KU OK. 2018.06.19 19:58:58 - OpenVPN > Validating certificate extended key usage. 2018.06.19 19:58:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 19:58:58 - OpenVPN > VERIFY EKU OK. 2018.06.19 19:58:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 19:58:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 19:58:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 19:58:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.19 20:00:57 - Updating systems & servers data .... 2018.06.19 20:00:58 - Systems & servers data update completed. 2018.06.19 20:11:02 - Updating systems & servers data .... 2018.06.19 20:11:02 - Systems & servers data update completed. 2018.06.19 20:21:06 - Updating systems & servers data .... 2018.06.19 20:21:07 - Systems & servers data update completed. 2018.06.19 20:31:11 - Updating systems & servers data .... 2018.06.19 20:31:12 - Systems & servers data update completed. 2018.06.19 20:41:15 - Updating systems & servers data .... 2018.06.19 20:41:17 - Systems & servers data update completed. 2018.06.19 20:51:20 - Updating systems & servers data .... 2018.06.19 20:51:21 - Systems & servers data update completed. 2018.06.19 20:58:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 20:58:59 - OpenVPN > VERIFY KU OK. 2018.06.19 20:58:59 - OpenVPN > Validating certificate extended key usage. 2018.06.19 20:58:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 20:58:59 - OpenVPN > VERIFY EKU OK. 2018.06.19 20:58:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 20:58:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 20:58:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 20:58:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.19 21:01:24 - Updating systems & servers data .... 2018.06.19 21:01:25 - Systems & servers data update completed. 2018.06.19 21:11:29 - Updating systems & servers data .... 2018.06.19 21:11:30 - Systems & servers data update completed. 2018.06.19 21:21:33 - Updating systems & servers data .... 2018.06.19 21:21:35 - Systems & servers data update completed. 2018.06.19 21:31:38 - Updating systems & servers data .... 2018.06.19 21:31:40 - Systems & servers data update completed. 2018.06.19 21:41:44 - Updating systems & servers data .... 2018.06.19 21:41:45 - Systems & servers data update completed. 2018.06.19 21:51:49 - Updating systems & servers data .... 2018.06.19 21:51:50 - Systems & servers data update completed. 2018.06.19 21:58:59 - OpenVPN > TLS: soft reset sec=0 bytes=9970930/-1 pkts=32899/0. 2018.06.19 21:58:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 21:58:59 - OpenVPN > VERIFY KU OK. 2018.06.19 21:58:59 - OpenVPN > Validating certificate extended key usage. 2018.06.19 21:58:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 21:58:59 - OpenVPN > VERIFY EKU OK. 2018.06.19 21:58:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 21:58:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 21:58:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 21:58:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.19 22:01:55 - Updating systems & servers data .... 2018.06.19 22:01:56 - Systems & servers data update completed. 2018.06.19 22:12:07 - Updating systems & servers data .... 2018.06.19 22:12:08 - Systems & servers data update completed. 2018.06.19 22:22:13 - Updating systems & servers data .... 2018.06.19 22:22:14 - Systems & servers data update completed. 2018.06.19 22:32:17 - Updating systems & servers data .... 2018.06.19 22:32:18 - Systems & servers data update completed. 2018.06.19 22:42:22 - Updating systems & servers data .... 2018.06.19 22:42:23 - Systems & servers data update completed. 2018.06.19 22:52:26 - Updating systems & servers data .... 2018.06.19 22:52:27 - Systems & servers data update completed. 2018.06.19 22:59:00 - OpenVPN > TLS: soft reset sec=-1 bytes=57147537/-1 pkts=89445/0. 2018.06.19 22:59:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 22:59:00 - OpenVPN > VERIFY KU OK. 2018.06.19 22:59:00 - OpenVPN > Validating certificate extended key usage. 2018.06.19 22:59:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 22:59:00 - OpenVPN > VERIFY EKU OK. 2018.06.19 22:59:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 22:59:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 22:59:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 22:59:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.19 23:02:30 - Updating systems & servers data .... 2018.06.19 23:02:31 - Systems & servers data update completed. 2018.06.19 23:12:35 - Updating systems & servers data .... 2018.06.19 23:12:36 - Systems & servers data update completed. 2018.06.19 23:22:40 - Updating systems & servers data .... 2018.06.19 23:22:41 - Systems & servers data update completed. 2018.06.19 23:32:45 - Updating systems & servers data .... 2018.06.19 23:32:46 - Systems & servers data update completed. 2018.06.19 23:42:49 - Updating systems & servers data .... 2018.06.19 23:42:50 - Systems & servers data update completed. 2018.06.19 23:52:54 - Updating systems & servers data .... 2018.06.19 23:52:54 - Systems & servers data update completed. 2018.06.19 23:59:00 - OpenVPN > TLS: soft reset sec=0 bytes=5769171/-1 pkts=23614/0. 2018.06.19 23:59:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.19 23:59:00 - OpenVPN > VERIFY KU OK. 2018.06.19 23:59:00 - OpenVPN > Validating certificate extended key usage. 2018.06.19 23:59:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.19 23:59:00 - OpenVPN > VERIFY EKU OK. 2018.06.19 23:59:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.19 23:59:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 23:59:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.19 23:59:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.20 00:02:58 - Updating systems & servers data .... 2018.06.20 00:02:59 - Systems & servers data update completed. 2018.06.20 00:13:03 - Updating systems & servers data .... 2018.06.20 00:13:04 - Systems & servers data update completed. 2018.06.20 00:23:07 - Updating systems & servers data .... 2018.06.20 00:23:08 - Systems & servers data update completed. 2018.06.20 00:33:11 - Updating systems & servers data .... 2018.06.20 00:33:12 - Systems & servers data update completed. 2018.06.20 00:43:16 - Updating systems & servers data .... 2018.06.20 00:43:17 - Systems & servers data update completed. 2018.06.20 00:53:21 - Updating systems & servers data .... 2018.06.20 00:53:22 - Systems & servers data update completed. 2018.06.20 00:59:00 - OpenVPN > TLS: soft reset sec=0 bytes=5320086/-1 pkts=22799/0. 2018.06.20 00:59:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.20 00:59:00 - OpenVPN > VERIFY KU OK. 2018.06.20 00:59:00 - OpenVPN > Validating certificate extended key usage. 2018.06.20 00:59:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.20 00:59:00 - OpenVPN > VERIFY EKU OK. 2018.06.20 00:59:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.20 00:59:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.20 00:59:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.20 00:59:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.20 01:03:25 - Updating systems & servers data .... 2018.06.20 01:03:27 - Systems & servers data update completed. 2018.06.20 01:13:30 - Updating systems & servers data .... 2018.06.20 01:13:31 - Systems & servers data update completed. 2018.06.20 01:23:35 - Updating systems & servers data .... 2018.06.20 01:23:35 - Systems & servers data update completed. 2018.06.20 01:33:39 - Updating systems & servers data .... 2018.06.20 01:33:40 - Systems & servers data update completed. 2018.06.20 01:43:43 - Updating systems & servers data .... 2018.06.20 01:43:44 - Systems & servers data update completed. 2018.06.20 01:53:47 - Updating systems & servers data .... 2018.06.20 01:53:48 - Systems & servers data update completed. 2018.06.20 01:59:00 - OpenVPN > TLS: soft reset sec=0 bytes=8459452/-1 pkts=27934/0. 2018.06.20 01:59:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.20 01:59:00 - OpenVPN > VERIFY KU OK. 2018.06.20 01:59:00 - OpenVPN > Validating certificate extended key usage. 2018.06.20 01:59:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.20 01:59:00 - OpenVPN > VERIFY EKU OK. 2018.06.20 01:59:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.20 01:59:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.20 01:59:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.20 01:59:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.20 02:03:52 - Updating systems & servers data .... 2018.06.20 02:03:53 - Systems & servers data update completed. 2018.06.20 02:13:56 - Updating systems & servers data .... 2018.06.20 02:14:51 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.06.20 02:14:51 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2018.06.20 02:14:51 - OpenVPN > Restart pause, 5 second(s)! 2018.06.20 02:14:51 - Disconnecting. 2018.06.20 02:14:52 - Routes, removed a route previously added, 80.84.49.20 for gateway 10.4.0.1. 2018.06.20 02:14:52 - Sending management termination signal. 2018.06.20 02:14:52 - Management - Send 'signal SIGTERM'. 2018.06.20 02:14:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.20 02:14:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 80.84.49.4 MASK 255.255.255.255 192.168.0.1. 2018.06.20 02:14:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.20 02:14:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.20 02:14:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.20 02:14:52 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.20 02:14:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.20 02:14:52 - OpenVPN > Closing TUN/TAP interface. 2018.06.20 02:14:52 - OpenVPN > TAP: DHCP address released. 2018.06.20 02:14:54 - Systems & servers data update completed. 2018.06.20 02:15:01 - Sending management termination signal. 2018.06.20 02:15:01 - Management - Send 'signal SIGTERM'. 2018.06.20 02:15:01 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.06.20 02:15:11 - Sending management termination signal. 2018.06.20 02:15:11 - Management - Send 'signal SIGTERM'. 2018.06.20 02:15:21 - Sending management termination signal. 2018.06.20 02:15:21 - Management - Send 'signal SIGTERM'. 2018.06.20 02:15:31 - Sending management termination signal. 2018.06.20 02:15:31 - Management - Send 'signal SIGTERM'. 2018.06.20 02:15:41 - Sending management termination signal. 2018.06.20 02:15:41 - Management - Send 'signal SIGTERM'. 2018.06.20 02:15:51 - Sending management termination signal. 2018.06.20 02:15:51 - Management - Send 'signal SIGTERM'. 2018.06.20 02:16:01 - Sending management termination signal. 2018.06.20 02:16:01 - Management - Send 'signal SIGTERM'. 2018.06.20 02:16:11 - Sending management termination signal. 2018.06.20 02:16:11 - Management - Send 'signal SIGTERM'. 2018.06.20 02:16:21 - Sending management termination signal. 2018.06.20 02:16:21 - Management - Send 'signal SIGTERM' Quote Share this post Link to post
Shadow101 0 Posted ... Dear All, Just to refresh this topic as it remains an issue. Randomly still getting the "sending management termination signal - Management - Send 'signal SIGTERM' loop error as described above. Deleting AppData\Local AirVPN did not help. When this loop occurs I have no choice but to restart the computer. If I try to close Eddie it freezes and eventually task manager is able to close it. However once it disappears the internet remains unavailable (this is independent of whether network lock was enabled or disabled). Any help would be greatly appreciated. The program works great. It is of course irritating to have to keep restarting my computer to use it though. Quote Share this post Link to post
LZ1 673 Posted ... Hello! Please try upgrading to the latest experimental client first of all: 2.16.1. If you don't know where to find it, you can check the FAQ listed in my signature. Changelog. As for not being able to connect when Eddie crashes with NL on, that's because it can't restore the original firewall rules. But you can do that yourself too. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
Shadow101 0 Posted ... LZ1, Thank you for your reply.I have tried updating to 2.16.1. The problem however remains.I also followed the link and despite following what was advised (including the elevated command prompt option) I am unable to get the internet back on. I would like to note the internet won't come back on when Eddie crashes with network lock disabled as well (indicating it is not related to the NL).Any further suggestions would be appreciated. I'm currently having to restart every hour or so. Quote Share this post Link to post
Shadow101 0 Posted ... Just adding a log which shows the point at which the loop starts. I am not sure if this is helpful but posting in case it is: . 2018.07.31 12:46:57 - Eddie version: 2.16.1 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.07.31 12:47:05 - Reading options from C:\Users\Home\AppData\Local\AirVPN\default.xml. 2018.07.31 12:47:06 - Command line arguments (1): path="home". 2018.07.31 12:47:06 - Profile path: C:\Users\Home\AppData\Local\AirVPN\default.xml. 2018.07.31 12:47:19 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2018.07.31 12:47:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.07.31 12:47:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.07.31 12:47:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.07.31 12:47:19 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.07.31 12:47:19 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pemW 2018.07.31 12:47:44 - Recovery. Unexpected crash?. 2018.07.31 12:47:47 - Routes, remove 185.103.96.147 for gateway 10.4.0.1 failed: The route deletion failed: Element not found. 2018.07.31 12:47:48 - Routes, remove 185.103.96.135 for gateway 10.23.248.1 failed: The route deletion failed: Element not found! 2018.07.31 12:47:48 - Activation of Network Lock - Windows Filtering PlatformI 2018.07.31 12:47:48 - Session starting.. 2018.07.31 12:47:48 - Updating systems & servers data .... 2018.07.31 12:47:49 - Systems & servers data update completedI 2018.07.31 12:47:55 - Checking authorization ...! 2018.07.31 12:47:56 - Connecting to Kitel (United Kingdom, Maidenhead). 2018.07.31 12:47:56 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.07.31 12:47:56 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.07.31 12:47:56 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.31 12:47:56 - Connection to OpenVPN Management Interface. 2018.07.31 12:47:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102. 2018.07.31 12:47:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.31 12:47:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.31 12:47:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.131:443. 2018.07.31 12:47:56 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.07.31 12:47:56 - OpenVPN > UDP link local: (not bound). 2018.07.31 12:47:56 - OpenVPN > UDP link remote: [AF_INET]185.103.96.131:443. 2018.07.31 12:47:56 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.131:443, sid=4eba7438 8439cb52. 2018.07.31 12:47:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 12:47:56 - OpenVPN > VERIFY KU OK. 2018.07.31 12:47:56 - OpenVPN > Validating certificate extended key usage. 2018.07.31 12:47:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 12:47:56 - OpenVPN > VERIFY EKU OK. 2018.07.31 12:47:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 12:47:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102. 2018.07.31 12:47:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 12:47:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.131:443. 2018.07.31 12:47:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.07.31 12:47:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.56.1,dhcp-option DNS6 fde6:7a:7d20:1038::1,tun-ipv6,route-gateway 10.20.56.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1038::100f/64 fde6:7a:7d20:1038::1,ifconfig 10.20.56.17 255.255.255.0,peer-id 12,cipher AES-256-GCM'. 2018.07.31 12:47:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.31 12:47:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.31 12:47:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.31 12:47:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 12:47:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 12:47:57 - OpenVPN > interactive service msg_channel=0. 2018.07.31 12:47:58 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=13 HWADDR=10:f0:05:04:ef:d4. 2018.07.31 12:47:58 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.07.31 12:47:58 - OpenVPN > GetBestInterfaceEx() returned if=13. 2018.07.31 12:47:58 - OpenVPN > GDG6: II=13 DP=::/0 NH=fe80::9221:6ff:feb2:f504. 2018.07.31 12:47:58 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2018.07.31 12:47:58 - OpenVPN > ROUTE6_GATEWAY fe80::9221:6ff:feb2:f504 I=13. 2018.07.31 12:47:58 - OpenVPN > open_tun. 2018.07.31 12:47:58 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{3C37B984-4786-48F6-9416-EA1B3504F251}.tap. 2018.07.31 12:47:58 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.07.31 12:47:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.56.0/10.20.56.17/255.255.255.0 [sUCCEEDED]. 2018.07.31 12:47:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.56.17/255.255.255.0 on interface {3C37B984-4786-48F6-9416-EA1B3504F251} [DHCP-serv: 10.20.56.254, lease-time: 31536000]. 2018.07.31 12:47:58 - OpenVPN > Successful ARP Flush on interface [6] {3C37B984-4786-48F6-9416-EA1B3504F251}. 2018.07.31 12:47:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.07.31 12:47:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=6 fde6:7a:7d20:1038::100f store=active. 2018.07.31 12:48:00 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1038::1 validate=no. 2018.07.31 12:48:01 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.. 2018.07.31 12:48:02 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1038::/64 -> fde6:7a:7d20:1038::100f metric 0) dev Ethernet 2. 2018.07.31 12:48:02 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1038::/64 interface=6 fe80::8 store=active. 2018.07.31 12:48:02 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 12:48:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.07.31 12:48:06 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 185.103.96.131 MASK 255.255.255.255 192.168.0.1. 2018.07.31 12:48:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.07.31 12:48:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.07.31 12:48:06 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.56.1. 2018.07.31 12:48:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.07.31 12:48:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.07.31 12:48:06 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.56.1. 2018.07.31 12:48:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.07.31 12:48:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.07.31 12:48:06 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1038::1 metric -1) dev Ethernet 2. 2018.07.31 12:48:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=6 fe80::8 store=active. 2018.07.31 12:48:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 12:48:06 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1038::1 metric -1) dev Ethernet 2. 2018.07.31 12:48:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=6 fe80::8 store=active. 2018.07.31 12:48:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 12:48:06 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1038::1 metric -1) dev Ethernet 2. 2018.07.31 12:48:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=6 fe80::8 store=active. 2018.07.31 12:48:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 12:48:07 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1038::1 metric -1) dev Ethernet 2. 2018.07.31 12:48:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=6 fe80::8 store=active. 2018.07.31 12:48:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 12:48:07 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.07.31 12:48:07 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.07.31 12:48:07 - DNS leak protection with packet filtering enabled.. 2018.07.31 12:48:10 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.20.56.1). 2018.07.31 12:48:11 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1038::1). 2018.07.31 12:48:11 - Routes, added a new route, 185.103.96.139 for gateway 10.20.56.1. 2018.07.31 12:48:12 - Routes, added a new route, 2a01:a500:320:8bf4:912f:3000:6ec:c2b7 for gateway fde6:7a:7d20:1038::1. 2018.07.31 12:48:12 - Flushing DNSI 2018.07.31 12:48:19 - Checking route IPv4I 2018.07.31 12:48:20 - Checking route IPv6I 2018.07.31 12:48:20 - Checking DNS! 2018.07.31 12:48:21 - Connected.. 2018.07.31 12:48:21 - OpenVPN > Initialization Sequence Completed. 2018.07.31 12:58:08 - Updating systems & servers data .... 2018.07.31 12:58:08 - Systems & servers data update completed. 2018.07.31 13:08:12 - Updating systems & servers data .... 2018.07.31 13:08:13 - Systems & servers data update completed. 2018.07.31 13:18:16 - Updating systems & servers data .... 2018.07.31 13:18:17 - Systems & servers data update completed. 2018.07.31 13:28:20 - Updating systems & servers data .... 2018.07.31 13:28:21 - Systems & servers data update completed. 2018.07.31 13:38:24 - Updating systems & servers data .... 2018.07.31 13:38:25 - Systems & servers data update completed. 2018.07.31 13:47:56 - OpenVPN > TLS: soft reset sec=0 bytes=34079611/-1 pkts=59699/0. 2018.07.31 13:47:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 13:47:56 - OpenVPN > VERIFY KU OK. 2018.07.31 13:47:56 - OpenVPN > Validating certificate extended key usage. 2018.07.31 13:47:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 13:47:56 - OpenVPN > VERIFY EKU OK. 2018.07.31 13:47:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 13:47:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 13:47:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 13:47:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 13:48:29 - Updating systems & servers data .... 2018.07.31 13:48:30 - Systems & servers data update completed. 2018.07.31 13:58:33 - Updating systems & servers data .... 2018.07.31 13:58:34 - Systems & servers data update completed. 2018.07.31 14:08:37 - Updating systems & servers data .... 2018.07.31 14:08:38 - Systems & servers data update completed. 2018.07.31 14:18:40 - Updating systems & servers data .... 2018.07.31 14:18:41 - Systems & servers data update completed. 2018.07.31 14:28:44 - Updating systems & servers data .... 2018.07.31 14:28:45 - Systems & servers data update completed. 2018.07.31 14:38:48 - Updating systems & servers data .... 2018.07.31 14:38:49 - Systems & servers data update completed. 2018.07.31 14:47:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 14:47:55 - OpenVPN > VERIFY KU OK. 2018.07.31 14:47:55 - OpenVPN > Validating certificate extended key usage. 2018.07.31 14:47:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 14:47:55 - OpenVPN > VERIFY EKU OK. 2018.07.31 14:47:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 14:47:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 14:47:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 14:47:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 14:48:52 - Updating systems & servers data .... 2018.07.31 14:48:53 - Systems & servers data update completed. 2018.07.31 14:58:56 - Updating systems & servers data .... 2018.07.31 14:58:57 - Systems & servers data update completed. 2018.07.31 15:09:00 - Updating systems & servers data .... 2018.07.31 15:09:01 - Systems & servers data update completed. 2018.07.31 15:19:04 - Updating systems & servers data .... 2018.07.31 15:19:05 - Systems & servers data update completed. 2018.07.31 15:29:08 - Updating systems & servers data .... 2018.07.31 15:29:09 - Systems & servers data update completed. 2018.07.31 15:39:12 - Updating systems & servers data .... 2018.07.31 15:39:14 - Systems & servers data update completed. 2018.07.31 15:47:55 - Renewing TLS key. 2018.07.31 15:47:55 - OpenVPN > TLS: tls_process: killed expiring key. 2018.07.31 15:47:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 15:47:55 - OpenVPN > VERIFY KU OK. 2018.07.31 15:47:55 - OpenVPN > Validating certificate extended key usage. 2018.07.31 15:47:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 15:47:55 - OpenVPN > VERIFY EKU OK. 2018.07.31 15:47:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 15:47:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 15:47:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 15:47:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 15:49:17 - Updating systems & servers data .... 2018.07.31 15:49:18 - Systems & servers data update completed. 2018.07.31 15:59:21 - Updating systems & servers data .... 2018.07.31 15:59:22 - Systems & servers data update completed. 2018.07.31 16:09:25 - Updating systems & servers data .... 2018.07.31 16:09:26 - Systems & servers data update completed. 2018.07.31 16:19:29 - Updating systems & servers data .... 2018.07.31 16:19:30 - Systems & servers data update completed. 2018.07.31 16:29:33 - Updating systems & servers data .... 2018.07.31 16:29:34 - Systems & servers data update completed. 2018.07.31 16:39:40 - Updating systems & servers data .... 2018.07.31 16:39:41 - Systems & servers data update completed. 2018.07.31 16:47:55 - Renewing TLS key. 2018.07.31 16:47:55 - OpenVPN > TLS: tls_process: killed expiring key. 2018.07.31 16:47:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 16:47:55 - OpenVPN > VERIFY KU OK. 2018.07.31 16:47:55 - OpenVPN > Validating certificate extended key usage. 2018.07.31 16:47:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 16:47:55 - OpenVPN > VERIFY EKU OK. 2018.07.31 16:47:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 16:47:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 16:47:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 16:47:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 16:49:48 - Updating systems & servers data .... 2018.07.31 16:49:49 - Systems & servers data update completed. 2018.07.31 16:59:52 - Updating systems & servers data .... 2018.07.31 16:59:53 - Systems & servers data update completed. 2018.07.31 17:09:56 - Updating systems & servers data .... 2018.07.31 17:09:58 - Systems & servers data update completed. 2018.07.31 17:20:01 - Updating systems & servers data .... 2018.07.31 17:20:02 - Systems & servers data update completed. 2018.07.31 17:30:05 - Updating systems & servers data .... 2018.07.31 17:30:06 - Systems & servers data update completed. 2018.07.31 17:40:10 - Updating systems & servers data .... 2018.07.31 17:40:12 - Systems & servers data update completed. 2018.07.31 17:47:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 17:47:55 - OpenVPN > VERIFY KU OK. 2018.07.31 17:47:55 - OpenVPN > Validating certificate extended key usage. 2018.07.31 17:47:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 17:47:55 - OpenVPN > VERIFY EKU OK. 2018.07.31 17:47:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 17:47:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 17:47:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 17:47:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 17:50:15 - Updating systems & servers data .... 2018.07.31 17:50:16 - Systems & servers data update completed. 2018.07.31 18:00:24 - Updating systems & servers data .... 2018.07.31 18:00:26 - Systems & servers data update completed. 2018.07.31 18:10:31 - Updating systems & servers data .... 2018.07.31 18:10:32 - Systems & servers data update completed. 2018.07.31 18:20:35 - Updating systems & servers data .... 2018.07.31 18:20:36 - Systems & servers data update completed. 2018.07.31 18:30:39 - Updating systems & servers data .... 2018.07.31 18:30:40 - Systems & servers data update completed. 2018.07.31 18:40:44 - Updating systems & servers data .... 2018.07.31 18:40:45 - Systems & servers data update completed. 2018.07.31 18:47:55 - OpenVPN > TLS: soft reset sec=0 bytes=693653272/-1 pkts=743798/0. 2018.07.31 18:47:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 18:47:55 - OpenVPN > VERIFY KU OK. 2018.07.31 18:47:55 - OpenVPN > Validating certificate extended key usage. 2018.07.31 18:47:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 18:47:55 - OpenVPN > VERIFY EKU OK. 2018.07.31 18:47:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 18:47:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 18:47:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 18:47:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 18:50:48 - Updating systems & servers data .... 2018.07.31 18:50:50 - Systems & servers data update completed. 2018.07.31 19:00:53 - Updating systems & servers data .... 2018.07.31 19:00:54 - Systems & servers data update completed. 2018.07.31 19:10:57 - Updating systems & servers data .... 2018.07.31 19:10:58 - Systems & servers data update completed. 2018.07.31 19:21:01 - Updating systems & servers data .... 2018.07.31 19:21:02 - Systems & servers data update completed. 2018.07.31 19:31:05 - Updating systems & servers data .... 2018.07.31 19:31:06 - Systems & servers data update completed. 2018.07.31 19:41:09 - Updating systems & servers data .... 2018.07.31 19:41:10 - Systems & servers data update completed. 2018.07.31 19:47:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.31 19:47:54 - OpenVPN > VERIFY KU OK. 2018.07.31 19:47:54 - OpenVPN > Validating certificate extended key usage. 2018.07.31 19:47:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.31 19:47:54 - OpenVPN > VERIFY EKU OK. 2018.07.31 19:47:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.07.31 19:47:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 19:47:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.31 19:47:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.31 19:51:13 - Updating systems & servers data .... 2018.07.31 19:51:14 - Systems & servers data update completed. 2018.07.31 20:01:17 - Updating systems & servers data .... 2018.07.31 20:01:17 - Systems & servers data update completed. 2018.07.31 20:11:20 - Updating systems & servers data .... 2018.07.31 20:11:22 - Systems & servers data update completed. 2018.07.31 20:21:56 - Updating systems & servers data .... 2018.07.31 20:21:57 - Systems & servers data update completed. 2018.07.31 20:32:49 - Updating systems & servers data .... 2018.07.31 20:32:50 - Systems & servers data update completed. 2018.07.31 20:39:02 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2018.07.31 20:39:02 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting! 2018.07.31 20:39:02 - Disconnecting. 2018.07.31 20:39:02 - Routes, removed a route previously added, 185.103.96.139 for gateway 10.20.56.1. 2018.07.31 20:39:04 - Routes, removed a route previously added, 2a01:a500:320:8bf4:912f:3000:6ec:c2b7 for gateway fde6:7a:7d20:1038::1. 2018.07.31 20:39:04 - OpenVPN > Restart pause, 5 second(s). 2018.07.31 20:39:04 - Sending management termination signal. 2018.07.31 20:39:04 - Management - Send 'signal SIGTERM'. 2018.07.31 20:39:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.07.31 20:39:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 185.103.96.131 MASK 255.255.255.255 192.168.0.1. 2018.07.31 20:39:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.07.31 20:39:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.56.1. 2018.07.31 20:39:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.07.31 20:39:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.56.1. 2018.07.31 20:39:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.07.31 20:39:04 - OpenVPN > delete_route_ipv6(::/3). 2018.07.31 20:39:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=6 fe80::8 store=active. 2018.07.31 20:39:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 20:39:04 - OpenVPN > delete_route_ipv6(2000::/4). 2018.07.31 20:39:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=6 fe80::8 store=active. 2018.07.31 20:39:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 20:39:05 - OpenVPN > delete_route_ipv6(3000::/4). 2018.07.31 20:39:05 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=6 fe80::8 store=active. 2018.07.31 20:39:05 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 20:39:05 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.07.31 20:39:05 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=6 fe80::8 store=active. 2018.07.31 20:39:05 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2018.07.31 20:39:05 - OpenVPN > Closing TUN/TAP interface. 2018.07.31 20:39:05 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1038::/64). 2018.07.31 20:39:05 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1038::/64 interface=6 fe80::8 store=active. 2018.07.31 20:39:05 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1038::100f store=active. 2018.07.31 20:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2018.07.31 20:39:06 - OpenVPN > TAP: DHCP address released. 2018.07.31 20:39:13 - Sending management termination signal. 2018.07.31 20:39:13 - Management - Send 'signal SIGTERM'. 2018.07.31 20:39:13 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2018.07.31 20:39:23 - Sending management termination signal. 2018.07.31 20:39:23 - Management - Send 'signal SIGTERM'. 2018.07.31 20:39:33 - Sending management termination signal. 2018.07.31 20:39:33 - Management - Send 'signal SIGTERM'. 2018.07.31 20:39:43 - Sending management termination signal. 2018.07.31 20:39:43 - Management - Send 'signal SIGTERM'. 2018.07.31 20:39:53 - Sending management termination signal. 2018.07.31 20:39:53 - Management - Send 'signal SIGTERM'. 2018.07.31 20:40:03 - Sending management termination signal. 2018.07.31 20:40:03 - Management - Send 'signal SIGTERM' Quote Share this post Link to post