Me You 0 Posted ... Hey, i haven't been able to connect to any US server in the past week or so. Every other server seems to work fine. I have manage to connect to Aquila though. Here are my logs: I 2018.06.28 18:20:27 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64. 2018.06.28 18:20:27 - Reading options from C:\Users\John\Downloads\Airvpn_windows_x64_portable\AirVPN.xml. 2018.06.28 18:20:27 - Data Path: C:\Users\John\Downloads\Airvpn_windows_x64_portable. 2018.06.28 18:20:27 - App Path: C:\Users\John\Downloads\Airvpn_windows_x64_portable. 2018.06.28 18:20:27 - Executable Path: C:\Users\John\Downloads\Airvpn_windows_x64_portable\AirVPN.exe. 2018.06.28 18:20:27 - Command line arguments (0):. 2018.06.28 18:20:27 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1. 2018.06.28 18:20:27 - Updating systems & servers data ...I 2018.06.28 18:20:27 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2I 2018.06.28 18:20:27 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Users\John\Downloads\Airvpn_windows_x64_portable\openvpn.exe)I 2018.06.28 18:20:27 - SSH - Version: plink 0.63 (C:\Users\John\Downloads\Airvpn_windows_x64_portable\plink.exe)I 2018.06.28 18:20:27 - SSL - Version: stunnel 5.17 (C:\Users\John\Downloads\Airvpn_windows_x64_portable\stunnel.exe)! 2018.06.28 18:20:27 - Ready. 2018.06.28 18:20:28 - Systems & servers data update completed! 2018.06.28 18:38:19 - Activation of Network Lock - Windows FirewallI 2018.06.28 18:50:20 - Session starting.I 2018.06.28 18:50:20 - IPv6 disabled.I 2018.06.28 18:50:20 - Checking authorization ...! 2018.06.28 18:50:21 - Connecting to Volans (United States, Dallas, Texas). 2018.06.28 18:50:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2018.06.28 18:50:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2018.06.28 18:50:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.28 18:50:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2018.06.28 18:50:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:50:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:50:21 - OpenVPN > Socket Buffers: R=[8192->524288] S=[8192->524288]. 2018.06.28 18:50:21 - OpenVPN > UDPv4 link local: [undef]. 2018.06.28 18:50:21 - OpenVPN > UDPv4 link remote: [AF_INET]199.249.230.31:80. 2018.06.28 18:50:21 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.31:80, sid=6a44b8a4 d5aace5f. 2018.06.28 18:50:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.28 18:50:21 - OpenVPN > Validating certificate key usage. 2018.06.28 18:50:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2018.06.28 18:50:21 - OpenVPN > VERIFY KU OK. 2018.06.28 18:50:21 - OpenVPN > Validating certificate extended key usage. 2018.06.28 18:50:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.28 18:50:21 - OpenVPN > VERIFY EKU OK. 2018.06.28 18:50:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Volans, emailAddress=info@airvpn.org. 2018.06.28 18:50:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.28 18:50:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:50:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.28 18:50:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:50:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.28 18:50:22 - OpenVPN > [Volans] Peer Connection Initiated with [AF_INET]199.249.230.31:80. 2018.06.28 18:50:24 - OpenVPN > SENT CONTROL [Volans]: 'PUSH_REQUEST' (status=1). 2018.06.28 18:50:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.32.92.1,route-gateway 10.32.92.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.32.92.26 255.255.255.0,peer-id 6'. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.28 18:50:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561. 2018.06.28 18:50:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2018.06.28 18:50:24 - OpenVPN > open_tun, tt->ipv6=0. 2018.06.28 18:50:24 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{7DABCFDC-1F2A-40D0-B514-22D322602158}.tap. 2018.06.28 18:50:24 - OpenVPN > TAP-Windows Driver Version 9.9. 2018.06.28 18:50:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.92.0/10.32.92.26/255.255.255.0 [sUCCEEDED]. 2018.06.28 18:50:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.92.26/255.255.255.0 on interface {7DABCFDC-1F2A-40D0-B514-22D322602158} [DHCP-serv: 10.32.92.254, lease-time: 31536000]. 2018.06.28 18:50:24 - OpenVPN > Successful ARP Flush on interface [14] {7DABCFDC-1F2A-40D0-B514-22D322602158}. 2018.06.28 18:50:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.28 18:50:29 - OpenVPN > C:\windows\system32\route.exe ADD 199.249.230.31 MASK 255.255.255.255 192.168.1.1. 2018.06.28 18:50:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2018.06.28 18:50:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:50:29 - OpenVPN > C:\windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 16. 2018.06.28 18:50:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2018.06.28 18:50:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:50:29 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.92.1. 2018.06.28 18:50:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2018.06.28 18:50:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:50:29 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.92.1. 2018.06.28 18:50:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2018.06.28 18:50:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:50:29 - Starting Management Interface. 2018.06.28 18:50:29 - OpenVPN > Initialization Sequence CompletedI 2018.06.28 18:50:29 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2018.06.28 18:50:29 - DNS of a network adapter forced (NETGEAR A6210 WiFi USB3.0 Adapter)I 2018.06.28 18:50:29 - Flushing DNSI 2018.06.28 18:50:29 - Checking routeW 2018.06.28 18:50:29 - Unable to connect to the remote server! 2018.06.28 18:50:29 - Disconnecting. 2018.06.28 18:50:29 - Management - Send 'signal SIGTERM'. 2018.06.28 18:50:29 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.28 18:50:29 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.28 18:50:29 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2018.06.28 18:50:34 - OpenVPN > C:\windows\system32\route.exe DELETE 199.249.230.31 MASK 255.255.255.255 192.168.1.1. 2018.06.28 18:50:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:50:34 - OpenVPN > C:\windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1. 2018.06.28 18:50:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:50:34 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.32.92.1. 2018.06.28 18:50:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:50:34 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.32.92.1. 2018.06.28 18:50:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:50:34 - OpenVPN > Closing TUN/TAP interface. 2018.06.28 18:50:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.28 18:50:34 - Connection terminated. I 2018.06.28 18:51:54 - Session starting.I 2018.06.28 18:51:54 - IPv6 disabled.I 2018.06.28 18:51:54 - Checking authorization ...! 2018.06.28 18:51:55 - Connecting to Heze (United States, Fremont, California). 2018.06.28 18:51:55 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2018.06.28 18:51:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2018.06.28 18:51:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.28 18:51:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2018.06.28 18:51:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:51:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:51:55 - OpenVPN > Socket Buffers: R=[8192->524288] S=[8192->524288]. 2018.06.28 18:51:55 - OpenVPN > UDPv4 link local: [undef]. 2018.06.28 18:51:55 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.151.106:80. 2018.06.28 18:51:55 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.151.106:80, sid=081fd920 781f0d9c. 2018.06.28 18:51:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.28 18:51:55 - OpenVPN > Validating certificate key usage. 2018.06.28 18:51:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2018.06.28 18:51:55 - OpenVPN > VERIFY KU OK. 2018.06.28 18:51:55 - OpenVPN > Validating certificate extended key usage. 2018.06.28 18:51:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.28 18:51:55 - OpenVPN > VERIFY EKU OK. 2018.06.28 18:51:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.28 18:51:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.28 18:51:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:51:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.28 18:51:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.28 18:51:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.28 18:51:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.151.106:80. 2018.06.28 18:52:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.28 18:52:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.18.252.1,route-gateway 10.18.252.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.18.252.187 255.255.255.0,peer-id 8'. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.28 18:52:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561. 2018.06.28 18:52:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2018.06.28 18:52:00 - OpenVPN > open_tun, tt->ipv6=0. 2018.06.28 18:52:00 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{7DABCFDC-1F2A-40D0-B514-22D322602158}.tap. 2018.06.28 18:52:00 - OpenVPN > TAP-Windows Driver Version 9.9. 2018.06.28 18:52:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.252.0/10.18.252.187/255.255.255.0 [sUCCEEDED]. 2018.06.28 18:52:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.252.187/255.255.255.0 on interface {7DABCFDC-1F2A-40D0-B514-22D322602158} [DHCP-serv: 10.18.252.254, lease-time: 31536000]. 2018.06.28 18:52:00 - OpenVPN > Successful ARP Flush on interface [14] {7DABCFDC-1F2A-40D0-B514-22D322602158}. 2018.06.28 18:52:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.28 18:52:05 - OpenVPN > C:\windows\system32\route.exe ADD 46.21.151.106 MASK 255.255.255.255 192.168.1.1. 2018.06.28 18:52:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2018.06.28 18:52:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:52:05 - OpenVPN > C:\windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 16. 2018.06.28 18:52:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2018.06.28 18:52:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:52:05 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.18.252.1. 2018.06.28 18:52:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2018.06.28 18:52:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:52:05 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.18.252.1. 2018.06.28 18:52:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2018.06.28 18:52:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.28 18:52:05 - Starting Management Interface. 2018.06.28 18:52:05 - OpenVPN > Initialization Sequence CompletedI 2018.06.28 18:52:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2018.06.28 18:52:05 - DNS of a network adapter forced (NETGEAR A6210 WiFi USB3.0 Adapter)I 2018.06.28 18:52:05 - Flushing DNSI 2018.06.28 18:52:05 - Checking routeW 2018.06.28 18:52:05 - Unable to connect to the remote server! 2018.06.28 18:52:05 - Disconnecting. 2018.06.28 18:52:05 - Management - Send 'signal SIGTERM'. 2018.06.28 18:52:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2018.06.28 18:52:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.28 18:52:05 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.28 18:52:10 - OpenVPN > C:\windows\system32\route.exe DELETE 46.21.151.106 MASK 255.255.255.255 192.168.1.1. 2018.06.28 18:52:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:52:10 - OpenVPN > C:\windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1. 2018.06.28 18:52:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:52:10 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.18.252.1. 2018.06.28 18:52:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:52:10 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.18.252.1. 2018.06.28 18:52:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.28 18:52:10 - OpenVPN > Closing TUN/TAP interface. 2018.06.28 18:52:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.28 18:52:10 - Connection terminated.I 2018.06.28 18:52:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2018.06.28 18:52:10 - DNS of a network adapter restored to original settings (NETGEAR A6210 WiFi USB3.0 Adapter)I 2018.06.28 18:52:12 - Cancel requested.I 2018.06.28 18:52:12 - IPv6 restored.! 2018.06.28 18:52:12 - Session terminated. Quote Share this post Link to post