Jump to content
Not connected, Your IP: 44.198.57.9
anotherusername

ANSWERED Are some servers now no longer working?

Recommended Posts

Although being shown in the servers window as being active, there are several servers I can no longer connect to (eg Dabih, Naos) which i have used over a long period of time.

 

I can connect to others, so I assume it is not Eddie or my PC.

 

I cannot connect to Dabih (for instance) on three different PCs. So I assume it is not one PC which has the issue.

 

What might the issue be?

 

Thanks.

 

ps It goes through the whole process of latency tests/conncecting/etc, but at the last minute just says 'disconnecting' then starts the cycle again.

 

 

Share this post


Link to post

Although being shown in the servers window as being active, there are several servers I can no longer connect to (eg Dabih, Naos) which i have used over a long period of time.

 

I can connect to others, so I assume it is not Eddie or my PC.

 

I cannot connect to Dabih (for instance) on three different PCs. So I assume it is not one PC which has the issue.

 

What might the issue be?

 

Thanks.

 

ps It goes through the whole process of latency tests/conncecting/etc, but at the last minute just says 'disconnecting' then starts the cycle again.

 

 

Share this post


Link to post

Although shown as being active, I cannot connect to certain servers which I have been using for a couple of years (eg Dabih / Naos).

 

Eddie goes through the whole 'latency tests/connecting' process, but at the last minute says 'disconnecting' then starts the whole process again.

 

This occurs on three different PCs with specific servers.

 

Are those servers having some kind of issue? They are not shown as doing so on this site.

 

What might the issue be?

Share this post


Link to post

Hello!

 

You can always check the status here.

 

Otherwise it's good if you share your entire log .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Thanks. Fair comment about the log!:

 

. 2018.07.13 12:40:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:27 - Starting Management Interface
. 2018.07.13 12:40:27 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:40:27 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:27 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:40:27 - Flushing DNS
I 2018.07.13 12:40:27 - Checking route
W 2018.07.13 12:40:28 - Unable to connect to the remote server
! 2018.07.13 12:40:28 - Disconnecting
. 2018.07.13 12:40:28 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:40:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:40:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:40:28 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:33 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:40:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:40:34 - Connection terminated.
I 2018.07.13 12:40:34 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:34 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:40:37 - Checking authorization ...
! 2018.07.13 12:40:37 - Connecting to Naos (United Kingdom, Manchester)
. 2018.07.13 12:40:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 12:40:37 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:40:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:40:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:40:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:40:38 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:40:38 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.117.56:443
. 2018.07.13 12:40:38 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.117.56:443, sid=2cf54d74 84bfa96e
. 2018.07.13 12:40:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:40:38 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:40:38 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:40:38 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:40:38 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:40:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:40:38 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:40:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:40:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.117.56:443
. 2018.07.13 12:40:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:40:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.24.220.1,route-gateway 10.24.220.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.24.220.13 255.255.255.0,peer-id 2'
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:40:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:40:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:40:41 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:40:41 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:40:41 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:40:41 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.220.0/10.24.220.13/255.255.255.0 [sUCCEEDED]
. 2018.07.13 12:40:41 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.220.13/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.24.220.254, lease-time: 31536000]
. 2018.07.13 12:40:41 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:40:46 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:46 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:40:46 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:46 - Starting Management Interface
. 2018.07.13 12:40:46 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:40:47 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:47 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:40:47 - Flushing DNS
I 2018.07.13 12:40:47 - Checking route
W 2018.07.13 12:40:47 - Unable to connect to the remote server
! 2018.07.13 12:40:47 - Disconnecting
. 2018.07.13 12:40:47 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:40:47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:40:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 12:40:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:40:52 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:40:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:40:52 - Connection terminated.
I 2018.07.13 12:40:52 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:40:52 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:40:55 - Checking authorization ...
! 2018.07.13 12:40:55 - Connecting to Dabih (United Kingdom, Manchester)
. 2018.07.13 12:40:56 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 12:40:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:40:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:40:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:40:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:40:56 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:40:56 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2018.07.13 12:40:56 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=784457de 08fd4ba8
. 2018.07.13 12:40:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:40:56 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:40:56 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:40:56 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:40:56 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:40:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:40:56 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:40:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:40:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:40:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:40:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2018.07.13 12:40:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:40:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.60.1,route-gateway 10.15.60.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.60.26 255.255.255.0,peer-id 13'
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:40:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:40:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:40:59 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:41:00 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:41:00 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:41:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.60.0/10.15.60.26/255.255.255.0 [sUCCEEDED]
. 2018.07.13 12:41:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.60.26/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.15.60.254, lease-time: 31536000]
. 2018.07.13 12:41:00 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:41:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:41:04 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:04 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:41:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:05 - Starting Management Interface
. 2018.07.13 12:41:05 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:41:05 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:41:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:41:05 - Flushing DNS
I 2018.07.13 12:41:05 - Checking route
W 2018.07.13 12:41:05 - Unable to connect to the remote server
! 2018.07.13 12:41:05 - Disconnecting
. 2018.07.13 12:41:05 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:41:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:41:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:41:05 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 12:41:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:10 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:41:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:41:10 - Connection terminated.
I 2018.07.13 12:41:10 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:41:10 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:41:13 - Checking authorization ...
! 2018.07.13 12:41:13 - Connecting to Denebola (United Kingdom, Maidenhead)
. 2018.07.13 12:41:14 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 12:41:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:41:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:41:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:41:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:14 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:41:14 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:41:14 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.133:443
. 2018.07.13 12:41:14 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.133:443, sid=20987a28 3fb471ee
. 2018.07.13 12:41:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:41:14 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:41:14 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:41:14 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:41:14 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:41:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:41:14 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:41:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:41:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:41:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:41:15 - OpenVPN > [Chamaeleon] Peer Connection Initiated with [AF_INET]185.103.96.133:443
. 2018.07.13 12:41:17 - OpenVPN > SENT CONTROL [Chamaeleon]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:41:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.83 255.255.0.0,peer-id 15'
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:41:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:41:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:41:17 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:41:17 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:41:17 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:41:17 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.83/255.255.0.0 [sUCCEEDED]
. 2018.07.13 12:41:17 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.83/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 12:41:17 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:41:22 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:41:22 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:41:22 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:41:22 - Starting Management Interface
. 2018.07.13 12:41:22 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:41:22 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:41:22 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:41:22 - Flushing DNS
I 2018.07.13 12:41:22 - Checking route
I 2018.07.13 12:41:23 - Checking DNS
! 2018.07.13 12:41:23 - Connected.
. 2018.07.13 12:41:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 12:41:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2018.07.13 12:45:53 - Disconnecting
. 2018.07.13 12:45:53 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:45:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:45:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:45:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:45:58 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:45:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:45:59 - Connection terminated.
I 2018.07.13 12:45:59 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:45:59 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:46:02 - Checking authorization ...
! 2018.07.13 12:46:02 - Connecting to Nashira (United Kingdom, Manchester)
. 2018.07.13 12:46:02 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 12:46:02 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:46:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:46:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:46:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:03 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:46:03 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:46:03 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443
. 2018.07.13 12:46:03 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=1e9f0c42 25162898
. 2018.07.13 12:46:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:46:03 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:46:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:46:03 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:46:03 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:46:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:46:03 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:46:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:46:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443
. 2018.07.13 12:46:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:46:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.25.28.1,route-gateway 10.25.28.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.25.28.176 255.255.255.0,peer-id 14'
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:46:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:46:06 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:46:06 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:46:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:46:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:46:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.28.0/10.25.28.176/255.255.255.0 [sUCCEEDED]
. 2018.07.13 12:46:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.28.176/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.25.28.254, lease-time: 31536000]
. 2018.07.13 12:46:07 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:46:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:11 - Starting Management Interface
. 2018.07.13 12:46:11 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:46:12 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:46:12 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:46:12 - Flushing DNS
I 2018.07.13 12:46:12 - Checking route
W 2018.07.13 12:46:12 - Unable to connect to the remote server
! 2018.07.13 12:46:12 - Disconnecting
. 2018.07.13 12:46:12 - Management - Send 'signal SIGTERM'
. 2018.07.13 12:46:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:46:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 12:46:12 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.28.1
. 2018.07.13 12:46:17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:17 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 12:46:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 12:46:17 - Connection terminated.
I 2018.07.13 12:46:17 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:46:17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 12:46:20 - Checking authorization ...
! 2018.07.13 12:46:21 - Connecting to Denebola (United Kingdom, Maidenhead)
. 2018.07.13 12:46:21 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 12:46:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 12:46:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 12:46:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 12:46:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:21 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 12:46:21 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 12:46:21 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.133:443
. 2018.07.13 12:46:21 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.133:443, sid=b6753353 fb61feb5
. 2018.07.13 12:46:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 12:46:22 - OpenVPN > Validating certificate key usage
. 2018.07.13 12:46:22 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 12:46:22 - OpenVPN > VERIFY KU OK
. 2018.07.13 12:46:22 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 12:46:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 12:46:22 - OpenVPN > VERIFY EKU OK
. 2018.07.13 12:46:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 12:46:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 12:46:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 12:46:22 - OpenVPN > [Chamaeleon] Peer Connection Initiated with [AF_INET]185.103.96.133:443
. 2018.07.13 12:46:24 - OpenVPN > SENT CONTROL [Chamaeleon]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 12:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.83 255.255.0.0,peer-id 15'
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 12:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 12:46:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 12:46:24 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 12:46:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 12:46:24 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 12:46:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.83/255.255.0.0 [sUCCEEDED]
. 2018.07.13 12:46:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.83/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 12:46:24 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 12:46:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 12:46:29 - Starting Management Interface
. 2018.07.13 12:46:29 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 12:46:29 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 12:46:29 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 12:46:29 - Flushing DNS
I 2018.07.13 12:46:30 - Checking route
I 2018.07.13 12:46:30 - Checking DNS
! 2018.07.13 12:46:30 - Connected.
. 2018.07.13 12:46:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 12:46:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 13:05:20 - Updating systems & servers data ...
. 2018.07.13 13:05:22 - Systems & servers data update completed
. 2018.07.13 13:36:14 - Updating systems & servers data ...
. 2018.07.13 13:36:16 - Systems & servers data update completed
. 2018.07.13 13:46:23 - OpenVPN > TLS: soft reset sec=0 bytes=89276060/0 pkts=125766/0
. 2018.07.13 13:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 13:46:23 - OpenVPN > Validating certificate key usage
. 2018.07.13 13:46:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 13:46:23 - OpenVPN > VERIFY KU OK
. 2018.07.13 13:46:23 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 13:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 13:46:23 - OpenVPN > VERIFY EKU OK
. 2018.07.13 13:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 13:46:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 13:46:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 14:06:40 - Updating systems & servers data ...
. 2018.07.13 14:07:40 - Systems & servers data update completed
. 2018.07.13 14:37:32 - Updating systems & servers data ...
. 2018.07.13 14:37:34 - Systems & servers data update completed
I 2018.07.13 14:46:22 - Renewing TLS key
. 2018.07.13 14:46:22 - OpenVPN > TLS: tls_process: killed expiring key
. 2018.07.13 14:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 14:46:23 - OpenVPN > Validating certificate key usage
. 2018.07.13 14:46:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 14:46:23 - OpenVPN > VERIFY KU OK
. 2018.07.13 14:46:23 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 14:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 14:46:23 - OpenVPN > VERIFY EKU OK
. 2018.07.13 14:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 14:46:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 14:46:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:08:13 - Updating systems & servers data ...
. 2018.07.13 15:08:14 - Systems & servers data update completed
. 2018.07.13 15:38:51 - Updating systems & servers data ...
. 2018.07.13 15:38:52 - Systems & servers data update completed
! 2018.07.13 15:44:52 - Disconnecting
. 2018.07.13 15:44:52 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:44:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:44:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:44:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:44:57 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:44:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:44:58 - Connection terminated.
I 2018.07.13 15:45:00 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:00 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:45:03 - Checking authorization ...
! 2018.07.13 15:45:04 - Connecting to Naos (United Kingdom, Manchester)
. 2018.07.13 15:45:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 15:45:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:45:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:45:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:45:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:45:05 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:45:05 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.117.56:443
. 2018.07.13 15:45:05 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.117.56:443, sid=064fb171 95078e34
. 2018.07.13 15:45:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:45:05 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:45:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:45:05 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:45:05 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:45:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:45:05 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:45:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:45:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.117.56:443
. 2018.07.13 15:45:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:45:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.24.220.1,route-gateway 10.24.220.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.24.220.13 255.255.255.0,peer-id 5'
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:45:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:45:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:45:08 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:45:08 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:45:08 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:45:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.220.0/10.24.220.13/255.255.255.0 [sUCCEEDED]
. 2018.07.13 15:45:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.220.13/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.24.220.254, lease-time: 31536000]
. 2018.07.13 15:45:08 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:45:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:13 - Starting Management Interface
. 2018.07.13 15:45:14 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:45:14 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:14 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:45:14 - Flushing DNS
I 2018.07.13 15:45:14 - Checking route
W 2018.07.13 15:45:14 - Unable to connect to the remote server
! 2018.07.13 15:45:15 - Disconnecting
. 2018.07.13 15:45:15 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:45:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 15:45:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:45:15 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.117.56 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.220.1
. 2018.07.13 15:45:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:20 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:45:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:45:20 - Connection terminated.
I 2018.07.13 15:45:20 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:20 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:45:30 - Checking authorization ...
! 2018.07.13 15:45:30 - Connecting to Dabih (United Kingdom, Manchester)
. 2018.07.13 15:45:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 15:45:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:45:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:45:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:45:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:31 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:45:31 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:45:31 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:31 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=89bc1543 accb0dd8
. 2018.07.13 15:45:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:45:31 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:45:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:45:31 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:45:31 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:45:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:45:31 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:45:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:45:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:45:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.60.1,route-gateway 10.15.60.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.60.26 255.255.255.0,peer-id 6'
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:45:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:45:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:45:34 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:45:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:45:34 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:45:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.60.0/10.15.60.26/255.255.255.0 [sUCCEEDED]
. 2018.07.13 15:45:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.60.26/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.15.60.254, lease-time: 31536000]
. 2018.07.13 15:45:34 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:45:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:39 - Starting Management Interface
. 2018.07.13 15:45:39 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:45:39 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:39 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:45:39 - Flushing DNS
I 2018.07.13 15:45:39 - Checking route
W 2018.07.13 15:45:39 - Unable to connect to the remote server
! 2018.07.13 15:45:40 - Disconnecting
. 2018.07.13 15:45:40 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:45:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 15:45:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:45:40 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:45 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:45 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:45:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:45:45 - Connection terminated.
I 2018.07.13 15:45:45 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:45 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:45:49 - Checking authorization ...
! 2018.07.13 15:45:49 - Connecting to Dabih (United Kingdom, Manchester)
. 2018.07.13 15:45:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 15:45:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:45:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:45:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:45:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:45:50 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:45:50 - OpenVPN > UDPv4 link remote: [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:50 - OpenVPN > TLS: Initial packet from [AF_INET]82.145.37.202:443, sid=d7dc62e2 d2fa4a03
. 2018.07.13 15:45:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:45:50 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:45:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:45:50 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:45:50 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:45:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:45:50 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:45:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:45:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:45:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:45:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]82.145.37.202:443
. 2018.07.13 15:45:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:45:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.60.1,route-gateway 10.15.60.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.60.26 255.255.255.0,peer-id 6'
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:45:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:45:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:45:53 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:45:53 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:45:53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:45:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.60.0/10.15.60.26/255.255.255.0 [sUCCEEDED]
. 2018.07.13 15:45:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.60.26/255.255.255.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.15.60.254, lease-time: 31536000]
. 2018.07.13 15:45:53 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:45:58 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:45:58 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:45:58 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:45:58 - Starting Management Interface
. 2018.07.13 15:45:58 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:45:58 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:45:58 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:45:58 - Flushing DNS
I 2018.07.13 15:45:58 - Checking route
W 2018.07.13 15:45:58 - Unable to connect to the remote server
! 2018.07.13 15:45:58 - Disconnecting
. 2018.07.13 15:45:58 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:45:58 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 15:45:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:45:58 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2018.07.13 15:45:58 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 82.145.37.202 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.15.60.1
. 2018.07.13 15:46:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:03 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:46:03 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:46:03 - Connection terminated.
I 2018.07.13 15:46:03 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:46:03 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:46:06 - Checking authorization ...
! 2018.07.13 15:46:06 - Connecting to Denebola (United Kingdom, Maidenhead)
. 2018.07.13 15:46:07 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 15:46:07 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:46:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:46:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:46:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:07 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:46:07 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:46:07 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.133:443
. 2018.07.13 15:46:07 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.133:443, sid=46b4abb3 86ba0a10
. 2018.07.13 15:46:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:46:07 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:46:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:46:07 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:46:07 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:46:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:46:07 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:46:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:46:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:46:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:46:08 - OpenVPN > [Chamaeleon] Peer Connection Initiated with [AF_INET]185.103.96.133:443
. 2018.07.13 15:46:10 - OpenVPN > SENT CONTROL [Chamaeleon]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:46:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.83 255.255.0.0,peer-id 15'
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:46:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:46:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:46:10 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:46:10 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:46:10 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:46:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.23.83/255.255.0.0 [sUCCEEDED]
. 2018.07.13 15:46:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.23.83/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 15:46:10 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:46:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:46:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:46:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:46:16 - Starting Management Interface
. 2018.07.13 15:46:16 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:46:16 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:46:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:46:16 - Flushing DNS
I 2018.07.13 15:46:16 - Checking route
I 2018.07.13 15:46:17 - Checking DNS
! 2018.07.13 15:46:17 - Connected.
. 2018.07.13 15:46:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 15:46:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2018.07.13 15:54:51 - Disconnecting
. 2018.07.13 15:54:51 - Management - Send 'signal SIGTERM'
. 2018.07.13 15:54:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.13 15:54:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.133 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:54:56 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.07.13 15:54:56 - OpenVPN > Closing TUN/TAP interface
. 2018.07.13 15:54:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.13 15:54:57 - Connection terminated.
I 2018.07.13 15:54:57 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:54:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2018.07.13 15:55:00 - Checking authorization ...
! 2018.07.13 15:55:00 - Connecting to Algedi (United Kingdom, London)
. 2018.07.13 15:55:00 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2018.07.13 15:55:00 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2018.07.13 15:55:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.07.13 15:55:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.07.13 15:55:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2018.07.13 15:55:01 - OpenVPN > UDPv4 link local: [undef]
. 2018.07.13 15:55:01 - OpenVPN > UDPv4 link remote: [AF_INET]80.84.49.4:443
. 2018.07.13 15:55:01 - OpenVPN > TLS: Initial packet from [AF_INET]80.84.49.4:443, sid=46d83e42 3d772771
. 2018.07.13 15:55:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 15:55:01 - OpenVPN > Validating certificate key usage
. 2018.07.13 15:55:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 15:55:01 - OpenVPN > VERIFY KU OK
. 2018.07.13 15:55:01 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 15:55:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 15:55:01 - OpenVPN > VERIFY EKU OK
. 2018.07.13 15:55:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 15:55:01 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 15:55:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 15:55:01 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]80.84.49.4:443
. 2018.07.13 15:55:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.07.13 15:55:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.10 255.255.0.0,peer-id 65'
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.13 15:55:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.07.13 15:55:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.07.13 15:55:04 - OpenVPN > open_tun, tt->ipv6=0
. 2018.07.13 15:55:04 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{0BF302BD-B1F6-4D87-8EB2-38223CAFD545}.tap
. 2018.07.13 15:55:04 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.07.13 15:55:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.4.10/255.255.0.0 [sUCCEEDED]
. 2018.07.13 15:55:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.4.10/255.255.0.0 on interface {0BF302BD-B1F6-4D87-8EB2-38223CAFD545} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.07.13 15:55:04 - OpenVPN > Successful ARP Flush on interface [9] {0BF302BD-B1F6-4D87-8EB2-38223CAFD545}
. 2018.07.13 15:55:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 80.84.49.4 MASK 255.255.255.255 192.168.1.254
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 3
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.07.13 15:55:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.07.13 15:55:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.07.13 15:55:09 - Starting Management Interface
. 2018.07.13 15:55:09 - OpenVPN > Initialization Sequence Completed
I 2018.07.13 15:55:09 - DNS of a network adapter forced (Qualcomm Atheros AR5BWB222 Wireless Network Adapter)
I 2018.07.13 15:55:09 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2018.07.13 15:55:09 - Flushing DNS
I 2018.07.13 15:55:10 - Checking route
I 2018.07.13 15:55:10 - Checking DNS
! 2018.07.13 15:55:10 - Connected.
. 2018.07.13 15:55:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.07.13 15:55:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2018.07.13 16:09:30 - Updating systems & servers data ...
. 2018.07.13 16:09:32 - Systems & servers data update completed
. 2018.07.13 16:40:19 - Updating systems & servers data ...
. 2018.07.13 16:40:21 - Systems & servers data update completed
. 2018.07.13 16:55:01 - OpenVPN > TLS: soft reset sec=0 bytes=45737104/0 pkts=66039/0
. 2018.07.13 16:55:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 16:55:02 - OpenVPN > Validating certificate key usage
. 2018.07.13 16:55:02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 16:55:02 - OpenVPN > VERIFY KU OK
. 2018.07.13 16:55:02 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 16:55:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 16:55:02 - OpenVPN > VERIFY EKU OK
. 2018.07.13 16:55:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 16:55:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 16:55:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 17:10:41 - Updating systems & servers data ...
. 2018.07.13 17:10:42 - Systems & servers data update completed
. 2018.07.13 17:41:19 - Updating systems & servers data ...
. 2018.07.13 17:41:20 - Systems & servers data update completed
I 2018.07.13 17:55:02 - Renewing TLS key
. 2018.07.13 17:55:02 - OpenVPN > TLS: tls_process: killed expiring key
. 2018.07.13 17:55:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 17:55:04 - OpenVPN > Validating certificate key usage
. 2018.07.13 17:55:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 17:55:04 - OpenVPN > VERIFY KU OK
. 2018.07.13 17:55:04 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 17:55:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 17:55:04 - OpenVPN > VERIFY EKU OK
. 2018.07.13 17:55:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 17:55:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 17:55:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 18:11:58 - Updating systems & servers data ...
. 2018.07.13 18:11:59 - Systems & servers data update completed
. 2018.07.13 18:42:36 - Updating systems & servers data ...
. 2018.07.13 18:42:37 - Systems & servers data update completed
. 2018.07.13 18:55:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 18:55:04 - OpenVPN > Validating certificate key usage
. 2018.07.13 18:55:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 18:55:04 - OpenVPN > VERIFY KU OK
. 2018.07.13 18:55:04 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 18:55:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 18:55:04 - OpenVPN > VERIFY EKU OK
. 2018.07.13 18:55:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 18:55:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 18:55:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 19:13:15 - Updating systems & servers data ...
. 2018.07.13 19:13:16 - Systems & servers data update completed
. 2018.07.13 19:43:54 - Updating systems & servers data ...
. 2018.07.13 19:43:55 - Systems & servers data update completed
. 2018.07.13 19:55:04 - OpenVPN > TLS: soft reset sec=0 bytes=684764/0 pkts=2091/0
. 2018.07.13 19:55:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 19:55:05 - OpenVPN > Validating certificate key usage
. 2018.07.13 19:55:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 19:55:05 - OpenVPN > VERIFY KU OK
. 2018.07.13 19:55:05 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 19:55:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 19:55:05 - OpenVPN > VERIFY EKU OK
. 2018.07.13 19:55:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 19:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 19:55:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 20:14:32 - Updating systems & servers data ...
. 2018.07.13 20:14:33 - Systems & servers data update completed
. 2018.07.13 20:45:11 - Updating systems & servers data ...
. 2018.07.13 20:45:13 - Systems & servers data update completed
I 2018.07.13 20:55:04 - Renewing TLS key
. 2018.07.13 20:55:04 - OpenVPN > TLS: tls_process: killed expiring key
. 2018.07.13 20:55:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 20:55:07 - OpenVPN > Validating certificate key usage
. 2018.07.13 20:55:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 20:55:07 - OpenVPN > VERIFY KU OK
. 2018.07.13 20:55:07 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 20:55:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 20:55:07 - OpenVPN > VERIFY EKU OK
. 2018.07.13 20:55:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 20:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 20:55:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 21:15:51 - Updating systems & servers data ...
. 2018.07.13 21:15:52 - Systems & servers data update completed
. 2018.07.13 21:46:45 - Updating systems & servers data ...
. 2018.07.13 21:46:49 - Systems & servers data update completed
. 2018.07.13 21:55:07 - OpenVPN > TLS: soft reset sec=0 bytes=38949152/0 pkts=57822/0
. 2018.07.13 21:55:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 21:55:07 - OpenVPN > Validating certificate key usage
. 2018.07.13 21:55:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 21:55:07 - OpenVPN > VERIFY KU OK
. 2018.07.13 21:55:07 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 21:55:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 21:55:07 - OpenVPN > VERIFY EKU OK
. 2018.07.13 21:55:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 21:55:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 21:55:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 22:17:29 - Updating systems & servers data ...
. 2018.07.13 22:17:31 - Systems & servers data update completed
. 2018.07.13 22:48:13 - Updating systems & servers data ...
. 2018.07.13 22:48:15 - Systems & servers data update completed
. 2018.07.13 22:55:07 - OpenVPN > TLS: soft reset sec=0 bytes=1825600/0 pkts=4493/0
. 2018.07.13 22:55:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.13 22:55:08 - OpenVPN > Validating certificate key usage
. 2018.07.13 22:55:08 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.07.13 22:55:08 - OpenVPN > VERIFY KU OK
. 2018.07.13 22:55:08 - OpenVPN > Validating certificate extended key usage
. 2018.07.13 22:55:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.13 22:55:08 - OpenVPN > VERIFY EKU OK
. 2018.07.13 22:55:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.07.13 22:55:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.13 22:55:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.13 23:18:52 - Updating systems & servers data ...
. 2018.07.13 23:18:54 - Systems & servers data update completed
 

Share this post


Link to post

Are you using the latest Eddie client? There's also an experimental release yet again.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I Also am having what I believe to be the same issue.

I am running an older version not updated at all to a recent version,

Only able to connect to about 40% of the servers.

I'm assuming the other 60% are being changed, updated, upgraded or in some way modified

as part of modernization ?

 

Has Dabih, for example received any new programing in the last 2 / 3 weeks ?

Curious for curiosity sake.

 

I will be updating the airvpn installation i have on my machine with in 12 hours and hopefully at the least

I will not lose any ground and may regain ability to connect on servers I cannot now.

 

If I do not reply to this thread with in 24 hours,

upgrading has not had a positive effect and in fact has worsened the situation

in that case please investigate a corrolation more extensively and I will attempt to roll back to current rig.

 

Also of note,

when I disengaged network lock I was able to connect to all servers.

(all internet functions are running normally for me, other then ability to connect to some servers

 with NL on. non-vpn'd function is 5/5 so its not the FW rules issues that others have dealt with)

 

thank you.

Share this post


Link to post

I Also am having what I believe to be the same issue.

I am running an older version not updated at all to a recent version,

Only able to connect to about 40% of the servers.

I'm assuming the other 60% are being changed, updated, upgraded or in some way modified

as part of modernization ?

 

Has Dabih, for example received any new programing in the last 2 / 3 weeks ?

Curious for curiosity sake.

 

I will be updating the airvpn installation i have on my machine with in 12 hours and hopefully at the least

I will not lose any ground and may regain ability to connect on servers I cannot now.

 

If I do not reply to this thread with in 24 hours,

upgrading has not had a positive effect and in fact has worsened the situation

in that case please investigate a corrolation more extensively and I will attempt to roll back to current rig.

 

Also of note,

when I disengaged network lock I was able to connect to all servers.

(all internet functions are running normally for me, other then ability to connect to some servers

 with NL on. non-vpn'd function is 5/5 so its not the FW rules issues that others have dealt with)

 

thank you.

If you mean to ask if there's changes being made to 60% of servers, which could be causing issues, then I can only say there would be many more posts in the forum about it .

 

Any new changes are announced in the announcement forum. Lastly, we don't know what's going on in your case if you don't append any logs.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Just to report: updating to the latest Eddie client appears to have resolved things and I can now connect to Dabih etc.

 

 

ps. I did try to update before my initial posts, but there was an issue installing it

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...