chadro_6963 0 Posted ... Hello, I cannot seem to connect to any VPN server. I get this "Restarting in 3..2..1" that loops forever and ever and all servers ever. Is it possible someone hacked my account? Quote Share this post Link to post
OpenSourcerer 1441 Posted ... These are neither logs nor usable information to determine what happened. Mr. chadro, please upload or paste the logfile here into tags. And please destroy your paranoia because if I were to hack someone it definitely wouldn't be some completely uninteresting someone like you. No one hacked your account, I'm quite sure about that. Mr. mrfp, this is not your thread, and your issue might be something else completely. For simplicity and to help both of you more directly, please open your own thread and, just like Mr. chadro, engulf your logs in [spoilers] or upload a text file here. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
chadro_6963 0 Posted ... Oh sorry about that. Here are the logs from trying to connect today. I do notice something there saying about a missing TAP Adapter, but I went to my network by typing NCPA.CPL in command prompt and it shows all my tunnel drivers there and enabled. So either AIRVPN is a liar or there could be some false positives. . 2018.09.19 18:09:35 - Eddie version: 2.15.2 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.10586.0, Mono/.Net: v4.0.30319. 2018.09.19 18:09:35 - Reading options from C:\Users\alex\AppData\Local\AirVPN\default.xml. 2018.09.19 18:09:35 - Command line arguments (1): path="home". 2018.09.19 18:09:35 - Profile path: C:\Users\alex\AppData\Local\AirVPN\default.xml. 2018.09.19 18:09:37 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2018.09.19 18:09:37 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (L:\Program Files\AirVPN\openvpn.exe). 2018.09.19 18:09:37 - SSH - Version: plink 0.67 (L:\Program Files\AirVPN\plink.exe). 2018.09.19 18:09:37 - SSL - Version: stunnel 5.40 (L:\Program Files\AirVPN\stunnel.exe). 2018.09.19 18:09:37 - curl - Version: 7.54.1 (L:\Program Files\AirVPN\curl.exe). 2018.09.19 18:09:37 - Certification Authorities: L:\Program Files\AirVPN\res\cacert.pemW 2018.09.19 18:09:38 - Recovery. Unexpected crash?. 2018.09.19 18:09:38 - Routes, remove 184.75.223.219 for gateway 10.4.0.1 failed: Network interface no more available.. 2018.09.19 18:09:38 - Updating systems & servers data ...I 2018.09.19 18:09:38 - Ready. 2018.09.19 18:09:39 - Systems & servers data update completedI 2018.09.19 18:09:42 - Session starting.I 2018.09.19 18:09:43 - Checking authorization ...! 2018.09.19 18:09:43 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.09.19 18:09:43 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.19 18:09:43 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.19 18:09:43 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.19 18:09:43 - Connection to OpenVPN Management Interface. 2018.09.19 18:09:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.19 18:09:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:09:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:09:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.09.19 18:09:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.19 18:09:43 - OpenVPN > UDP link local: (not bound). 2018.09.19 18:09:43 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.09.19 18:09:43 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=ea0a5e57 76a0cae2. 2018.09.19 18:09:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.19 18:09:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.19 18:09:43 - OpenVPN > VERIFY KU OK. 2018.09.19 18:09:43 - OpenVPN > Validating certificate extended key usage. 2018.09.19 18:09:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.19 18:09:43 - OpenVPN > VERIFY EKU OK. 2018.09.19 18:09:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.19 18:09:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.19 18:09:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.09.19 18:09:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.19 18:09:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.80.1,dhcp-option DNS6 fde6:7a:7d20:1850::1,tun-ipv6,route-gateway 10.28.80.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1850::1067/64 fde6:7a:7d20:1850::1,ifconfig 10.28.80.105 255.255.255.0,peer-id 9,cipher AES-256-GCM'. 2018.09.19 18:09:45 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.19 18:09:45 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.19 18:09:45 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.19 18:09:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:09:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:09:45 - OpenVPN > interactive service msg_channel=0. 2018.09.19 18:09:45 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=10 HWADDR=74:d0:2b:97:14:9f. 2018.09.19 18:09:45 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.19 18:09:45 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.09.19 18:09:45 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.09.19 18:09:45 - OpenVPN > open_tun. 2018.09.19 18:09:45 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2018.09.19 18:09:45 - OpenVPN > Exiting due to fatal error! 2018.09.19 18:09:45 - Disconnecting. 2018.09.19 18:09:45 - Connection terminated.I 2018.09.19 18:09:48 - Checking authorization ...! 2018.09.19 18:09:48 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.09.19 18:09:49 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.19 18:09:49 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.19 18:09:49 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.19 18:09:49 - Connection to OpenVPN Management Interface. 2018.09.19 18:09:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.19 18:09:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:09:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:09:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.09.19 18:09:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.19 18:09:49 - OpenVPN > UDP link local: (not bound). 2018.09.19 18:09:49 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.09.19 18:09:49 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=f7a5d1d6 d560af5f. 2018.09.19 18:09:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.19 18:09:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.19 18:09:49 - OpenVPN > VERIFY KU OK. 2018.09.19 18:09:49 - OpenVPN > Validating certificate extended key usage. 2018.09.19 18:09:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.19 18:09:49 - OpenVPN > VERIFY EKU OK. 2018.09.19 18:09:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.19 18:09:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.19 18:09:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.09.19 18:09:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)! 2018.09.19 18:09:51 - Disconnecting. 2018.09.19 18:09:51 - Sending management termination signal. 2018.09.19 18:09:51 - Management - Send 'signal SIGTERM'. 2018.09.19 18:09:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.09.19 18:09:51 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.09.19 18:09:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.80.1,dhcp-option DNS6 fde6:7a:7d20:1850::1,tun-ipv6,route-gateway 10.28.80.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1850::1067/64 fde6:7a:7d20:1850::1,ifconfig 10.28.80.105 255.255.255.0,peer-id 10,cipher AES-256-GCM'. 2018.09.19 18:09:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.19 18:09:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.19 18:09:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.19 18:09:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:09:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:09:52 - OpenVPN > interactive service msg_channel=0. 2018.09.19 18:09:52 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=10 HWADDR=74:d0:2b:97:14:9f. 2018.09.19 18:09:52 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.19 18:09:52 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.09.19 18:09:52 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.09.19 18:09:52 - OpenVPN > open_tun. 2018.09.19 18:09:52 - OpenVPN > MANAGEMENT: Client disconnected. 2018.09.19 18:09:52 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2018.09.19 18:09:52 - OpenVPN > Exiting due to fatal error. 2018.09.19 18:09:52 - Connection terminated.I 2018.09.19 18:09:52 - Cancel requested.! 2018.09.19 18:09:52 - Session terminated.I 2018.09.19 18:11:47 - Session starting.I 2018.09.19 18:11:48 - Checking authorization ...! 2018.09.19 18:11:48 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.09.19 18:11:48 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.19 18:11:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.19 18:11:48 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.19 18:11:48 - Connection to OpenVPN Management Interface. 2018.09.19 18:11:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.19 18:11:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:11:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:11:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.09.19 18:11:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.19 18:11:48 - OpenVPN > UDP link local: (not bound). 2018.09.19 18:11:48 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.09.19 18:11:48 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=a41f8abf a6d644ff. 2018.09.19 18:11:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.19 18:11:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.19 18:11:49 - OpenVPN > VERIFY KU OK. 2018.09.19 18:11:49 - OpenVPN > Validating certificate extended key usage. 2018.09.19 18:11:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.19 18:11:49 - OpenVPN > VERIFY EKU OK. 2018.09.19 18:11:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.19 18:11:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.19 18:11:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.09.19 18:11:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.19 18:11:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.80.1,dhcp-option DNS6 fde6:7a:7d20:1850::1,tun-ipv6,route-gateway 10.28.80.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1850::1067/64 fde6:7a:7d20:1850::1,ifconfig 10.28.80.105 255.255.255.0,peer-id 9,cipher AES-256-GCM'. 2018.09.19 18:11:50 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.19 18:11:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.19 18:11:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.19 18:11:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:11:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:11:50 - OpenVPN > interactive service msg_channel=0. 2018.09.19 18:11:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=10 HWADDR=74:d0:2b:97:14:9f. 2018.09.19 18:11:50 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.19 18:11:50 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.09.19 18:11:50 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.09.19 18:11:50 - OpenVPN > open_tun. 2018.09.19 18:11:50 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2018.09.19 18:11:50 - OpenVPN > Exiting due to fatal error! 2018.09.19 18:11:50 - Disconnecting. 2018.09.19 18:11:50 - Connection terminated.I 2018.09.19 18:11:53 - Checking authorization ...! 2018.09.19 18:11:54 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.09.19 18:11:54 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.19 18:11:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.19 18:11:54 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.19 18:11:54 - Connection to OpenVPN Management Interface. 2018.09.19 18:11:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.19 18:11:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:11:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:11:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.09.19 18:11:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.19 18:11:54 - OpenVPN > UDP link local: (not bound). 2018.09.19 18:11:54 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.09.19 18:11:54 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=1972d2cb cac07512. 2018.09.19 18:11:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.19 18:11:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.19 18:11:54 - OpenVPN > VERIFY KU OK. 2018.09.19 18:11:54 - OpenVPN > Validating certificate extended key usage. 2018.09.19 18:11:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.19 18:11:54 - OpenVPN > VERIFY EKU OK. 2018.09.19 18:11:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.19 18:11:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.19 18:11:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.09.19 18:11:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.19 18:11:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.80.1,dhcp-option DNS6 fde6:7a:7d20:1850::1,tun-ipv6,route-gateway 10.28.80.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1850::1067/64 fde6:7a:7d20:1850::1,ifconfig 10.28.80.105 255.255.255.0,peer-id 10,cipher AES-256-GCM'. 2018.09.19 18:11:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.19 18:11:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.19 18:11:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.19 18:11:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:11:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:11:55 - OpenVPN > interactive service msg_channel=0. 2018.09.19 18:11:55 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=10 HWADDR=74:d0:2b:97:14:9f. 2018.09.19 18:11:55 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.19 18:11:55 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.09.19 18:11:55 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.09.19 18:11:55 - OpenVPN > open_tun. 2018.09.19 18:11:55 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2018.09.19 18:11:55 - OpenVPN > Exiting due to fatal error! 2018.09.19 18:11:55 - Disconnecting. 2018.09.19 18:11:55 - Connection terminated.I 2018.09.19 18:11:58 - Checking authorization ...! 2018.09.19 18:11:59 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.09.19 18:11:59 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.19 18:11:59 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.19 18:11:59 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.19 18:11:59 - Connection to OpenVPN Management Interface. 2018.09.19 18:11:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.19 18:11:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:11:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:11:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.09.19 18:11:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.19 18:11:59 - OpenVPN > UDP link local: (not bound). 2018.09.19 18:11:59 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.09.19 18:11:59 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=0a6d2b69 193acc61. 2018.09.19 18:11:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.19 18:11:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.19 18:11:59 - OpenVPN > VERIFY KU OK. 2018.09.19 18:11:59 - OpenVPN > Validating certificate extended key usage. 2018.09.19 18:11:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.19 18:11:59 - OpenVPN > VERIFY EKU OK. 2018.09.19 18:11:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.19 18:11:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.19 18:11:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.09.19 18:12:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.19 18:12:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.80.1,dhcp-option DNS6 fde6:7a:7d20:1850::1,tun-ipv6,route-gateway 10.28.80.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1850::1067/64 fde6:7a:7d20:1850::1,ifconfig 10.28.80.105 255.255.255.0,peer-id 9,cipher AES-256-GCM'. 2018.09.19 18:12:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.19 18:12:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.19 18:12:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.19 18:12:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:12:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:12:00 - OpenVPN > interactive service msg_channel=0. 2018.09.19 18:12:00 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=10 HWADDR=74:d0:2b:97:14:9f. 2018.09.19 18:12:00 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.19 18:12:00 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.09.19 18:12:00 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.09.19 18:12:00 - OpenVPN > open_tun. 2018.09.19 18:12:00 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2018.09.19 18:12:00 - OpenVPN > Exiting due to fatal error! 2018.09.19 18:12:00 - Disconnecting. 2018.09.19 18:12:00 - Connection terminated.I 2018.09.19 18:12:03 - Checking authorization ...! 2018.09.19 18:12:04 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.09.19 18:12:04 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.09.19 18:12:04 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.09.19 18:12:04 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.09.19 18:12:04 - Connection to OpenVPN Management Interface. 2018.09.19 18:12:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.09.19 18:12:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:12:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.09.19 18:12:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.09.19 18:12:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.09.19 18:12:04 - OpenVPN > UDP link local: (not bound). 2018.09.19 18:12:04 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.09.19 18:12:04 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=2155d01a 3a1e205c. 2018.09.19 18:12:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.09.19 18:12:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.09.19 18:12:04 - OpenVPN > VERIFY KU OK. 2018.09.19 18:12:04 - OpenVPN > Validating certificate extended key usage. 2018.09.19 18:12:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.09.19 18:12:04 - OpenVPN > VERIFY EKU OK. 2018.09.19 18:12:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.09.19 18:12:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.09.19 18:12:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.09.19 18:12:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.09.19 18:12:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.80.1,dhcp-option DNS6 fde6:7a:7d20:1850::1,tun-ipv6,route-gateway 10.28.80.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1850::1067/64 fde6:7a:7d20:1850::1,ifconfig 10.28.80.105 255.255.255.0,peer-id 10,cipher AES-256-GCM'. 2018.09.19 18:12:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.09.19 18:12:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.09.19 18:12:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.09.19 18:12:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:12:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.09.19 18:12:06 - OpenVPN > interactive service msg_channel=0. 2018.09.19 18:12:06 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=10 HWADDR=74:d0:2b:97:14:9f. 2018.09.19 18:12:06 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.09.19 18:12:06 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.09.19 18:12:06 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.09.19 18:12:06 - OpenVPN > open_tun. 2018.09.19 18:12:06 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter.. 2018.09.19 18:12:06 - OpenVPN > Exiting due to fatal error! 2018.09.19 18:12:06 - Disconnecting. 2018.09.19 18:12:06 - Connection terminated.I 2018.09.19 18:12:09 - Checking authorization ...I 2018.09.19 18:12:09 - Cancel requested.! 2018.09.19 18:12:09 - Session terminated. Quote Share this post Link to post
LZ1 673 Posted ... Hello! Please start by downloading the latest Eddie client and then re-submit your logs if the issue persists . Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
Staff 10014 Posted ... Hello! The problem is that your system lacks a tun/tap adapter (the virtual network interface used by OpenVPN too). Try what OpenVPN suggests:. 2018.09.19 18:09:52 - OpenVPN > There are no TAP-Windows adapters on this system. You should be able to create a TAP-Windows adapter by going to Start -> All Programs -> TAP-Windows -> Utilities -> Add a new TAP-Windows virtual ethernet adapter. Run the "add adapter" script with administrator privileges. Kind regards Quote Share this post Link to post