Jump to content
Not connected, Your IP: 3.21.246.53
Sign in to follow this  
sunnymorning

am i the only one thats noticing random dropout

Recommended Posts

here we go again , ive been noticing as of the last couple of days that once i connect to airvpn its fine but after a short while my speed goes to just about 13kb and the upload bandwith on airvpn shows alot of activity , like the other time ive mentioned this problem , then again after about 10 or so min it goes back to normal speed and i can access the internet again , and then again randomly , apparently something with airvpn

heres a log

9/7/2012 - 12:50 PM AirVPN client version: 1.7

9/7/2012 - 12:50 PM Reading options from C:\extra\Program Files Portable\AirVPN\AirVPN.xml

9/7/2012 - 12:50 PM OpenVPN bundle version: OpenVPN 2.2.2

9/7/2012 - 12:50 PM OpenVPN current version: OpenVPN 2.2.2

9/7/2012 - 12:50 PM Login...

9/7/2012 - 12:50 PM Login success.

9/7/2012 - 12:50 PM Contacting service...

9/7/2012 - 12:50 PM Connecting...

9/7/2012 - 12:50 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

9/7/2012 - 12:50 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

9/7/2012 - 12:50 PM LZO compression initialized

9/7/2012 - 12:50 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

9/7/2012 - 12:50 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

9/7/2012 - 12:50 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

9/7/2012 - 12:50 PM Local Options hash (VER=V4): '22188c5b'

9/7/2012 - 12:50 PM Expected Remote Options hash (VER=V4): 'a8f55717'

9/7/2012 - 12:50 PM UDPv4 link local: [undef]

9/7/2012 - 12:50 PM UDPv4 link remote: 178.248.30.131:443

9/7/2012 - 12:50 PM TLS: Initial packet from 178.248.30.131:443, sid=9db3e7eb 979fbef9

9/7/2012 - 12:50 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 12:50 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 12:50 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 12:50 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 12:50 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 12:50 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 12:50 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 12:50 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/7/2012 - 12:50 PM [server] Peer Connection Initiated with 178.248.30.131:443

9/7/2012 - 12:50 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/7/2012 - 12:50 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.3.150 10.4.3.149'

9/7/2012 - 12:50 PM OPTIONS IMPORT: timers and/or timeouts modified

9/7/2012 - 12:50 PM OPTIONS IMPORT: LZO parms modified

9/7/2012 - 12:50 PM OPTIONS IMPORT: --ifconfig/up options modified

9/7/2012 - 12:50 PM OPTIONS IMPORT: route options modified

9/7/2012 - 12:50 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

9/7/2012 - 12:50 PM ROUTE default_gateway=192.168.2.1

9/7/2012 - 12:50 PM TAP-WIN32 device [AirVpn] opened: \\.\Global\{3735E6B5-891A-4B19-845A-0287055EDE9C}.tap

9/7/2012 - 12:50 PM TAP-Win32 Driver Version 9.9

9/7/2012 - 12:50 PM TAP-Win32 MTU=1500

9/7/2012 - 12:50 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.3.150/255.255.255.252 on interface {3735E6B5-891A-4B19-845A-0287055EDE9C} [DHCP-serv: 10.4.3.149, lease-time: 31536000]

9/7/2012 - 12:50 PM Successful ARP Flush on interface [20] {3735E6B5-891A-4B19-845A-0287055EDE9C}

9/7/2012 - 12:50 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

9/7/2012 - 12:50 PM C:\WINDOWS\system32\route.exe ADD 178.248.30.131 MASK 255.255.255.255 192.168.2.1

9/7/2012 - 12:50 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 12:50 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 12:50 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.149

9/7/2012 - 12:50 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM Initialization Sequence Completed

9/7/2012 - 12:50 PM Starting Management Interface...

9/7/2012 - 12:50 PM Checking...

9/7/2012 - 12:51 PM Retrieve statistics...

9/7/2012 - 12:51 PM Connected.

9/7/2012 - 1:32 PM Replay-window backtrack occurred [1]

9/7/2012 - 1:32 PM Replay-window backtrack occurred [2]

9/7/2012 - 1:33 PM Replay-window backtrack occurred [8]

9/7/2012 - 1:51 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:51 PM TLS Error: TLS handshake failed

9/7/2012 - 1:51 PM TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1

9/7/2012 - 1:51 PM TLS: Initial packet from 178.248.30.131:443, sid=e6e2e5f8 5dc05bb0

9/7/2012 - 1:52 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:52 PM TLS Error: TLS handshake failed

9/7/2012 - 1:53 PM TLS: Initial packet from 178.248.30.131:443, sid=5432a479 6893b186

9/7/2012 - 1:54 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:54 PM TLS Error: TLS handshake failed

9/7/2012 - 1:55 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:55 PM TLS Error: TLS handshake failed

9/7/2012 - 1:56 PM [uNDEF] Inactivity timeout (--ping-restart), restarting

9/7/2012 - 1:56 PM TCP/UDP: Closing socket

9/7/2012 - 1:56 PM Re-connecting...

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.3.149

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 178.248.30.131 MASK 255.255.255.255 192.168.2.1

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM Closing TUN/TAP interface

9/7/2012 - 1:56 PM SIGUSR1[soft,ping-restart] received, process restarting

9/7/2012 - 1:56 PM Restart pause, 2 second(s)

9/7/2012 - 1:56 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

9/7/2012 - 1:56 PM LZO compression initialized

9/7/2012 - 1:56 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

9/7/2012 - 1:56 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

9/7/2012 - 1:56 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

9/7/2012 - 1:56 PM Local Options hash (VER=V4): '22188c5b'

9/7/2012 - 1:56 PM Expected Remote Options hash (VER=V4): 'a8f55717'

9/7/2012 - 1:56 PM UDPv4 link local: [undef]

9/7/2012 - 1:56 PM UDPv4 link remote: 178.248.30.131:443

9/7/2012 - 1:56 PM TLS: Initial packet from 178.248.30.131:443, sid=c2f61d23 f9740f16

9/7/2012 - 1:56 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 1:56 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 1:56 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 1:56 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 1:56 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 1:56 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 1:56 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 1:56 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/7/2012 - 1:56 PM [server] Peer Connection Initiated with 178.248.30.131:443

9/7/2012 - 1:56 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/7/2012 - 1:56 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.3.150 10.4.3.149'

9/7/2012 - 1:56 PM OPTIONS IMPORT: timers and/or timeouts modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: LZO parms modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: --ifconfig/up options modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: route options modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

9/7/2012 - 1:56 PM ROUTE default_gateway=192.168.2.1

9/7/2012 - 1:56 PM TAP-WIN32 device [AirVpn] opened: \\.\Global\{3735E6B5-891A-4B19-845A-0287055EDE9C}.tap

9/7/2012 - 1:56 PM TAP-Win32 Driver Version 9.9

9/7/2012 - 1:56 PM TAP-Win32 MTU=1500

9/7/2012 - 1:56 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.3.150/255.255.255.252 on interface {3735E6B5-891A-4B19-845A-0287055EDE9C} [DHCP-serv: 10.4.3.149, lease-time: 31536000]

9/7/2012 - 1:56 PM Successful ARP Flush on interface [20] {3735E6B5-891A-4B19-845A-0287055EDE9C}

9/7/2012 - 1:56 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 178.248.30.131 MASK 255.255.255.255 192.168.2.1

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.149

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM Initialization Sequence Completed

9/7/2012 - 1:56 PM Starting Management Interface...

9/7/2012 - 1:56 PM Checking...

9/7/2012 - 1:56 PM Retrieve statistics...

9/7/2012 - 1:56 PM Connected.

9/7/2012 - 2:40 PM Replay-window backtrack occurred [19]

9/7/2012 - 2:40 PM Replay-window backtrack occurred [21]

9/7/2012 - 2:56 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 2:56 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 2:56 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 2:56 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 2:56 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 2:56 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 2:56 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 2:56 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/7/2012 - 3:02 PM Replay-window backtrack occurred [45]

this is while using the swedish server thou has been observed on others too , very odd , since i dont have it while connected to my regular isp without air hmmm..., not to mention ive checked my comodo firewall net activity and...nothing out of the ordinary, yes i am using 1.7 airvpn client, and ive tried different udp ports

Share this post


Link to post

update>

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 12:50 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 12:50 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.149

9/7/2012 - 12:50 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 12:50 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 12:50 PM Initialization Sequence Completed

9/7/2012 - 12:50 PM Starting Management Interface...

9/7/2012 - 12:50 PM Checking...

9/7/2012 - 12:51 PM Retrieve statistics...

9/7/2012 - 12:51 PM Connected.

9/7/2012 - 1:32 PM Replay-window backtrack occurred [1]

9/7/2012 - 1:32 PM Replay-window backtrack occurred [2]

9/7/2012 - 1:33 PM Replay-window backtrack occurred [8]

9/7/2012 - 1:51 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:51 PM TLS Error: TLS handshake failed

9/7/2012 - 1:51 PM TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1

9/7/2012 - 1:51 PM TLS: Initial packet from 178.248.30.131:443, sid=e6e2e5f8 5dc05bb0

9/7/2012 - 1:52 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:52 PM TLS Error: TLS handshake failed

9/7/2012 - 1:53 PM TLS: Initial packet from 178.248.30.131:443, sid=5432a479 6893b186

9/7/2012 - 1:54 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:54 PM TLS Error: TLS handshake failed

9/7/2012 - 1:55 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 1:55 PM TLS Error: TLS handshake failed

9/7/2012 - 1:56 PM [uNDEF] Inactivity timeout (--ping-restart), restarting

9/7/2012 - 1:56 PM TCP/UDP: Closing socket

9/7/2012 - 1:56 PM Re-connecting...

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.3.149

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 178.248.30.131 MASK 255.255.255.255 192.168.2.1

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM Route deletion via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM Closing TUN/TAP interface

9/7/2012 - 1:56 PM SIGUSR1[soft,ping-restart] received, process restarting

9/7/2012 - 1:56 PM Restart pause, 2 second(s)

9/7/2012 - 1:56 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

9/7/2012 - 1:56 PM LZO compression initialized

9/7/2012 - 1:56 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

9/7/2012 - 1:56 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

9/7/2012 - 1:56 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

9/7/2012 - 1:56 PM Local Options hash (VER=V4): '22188c5b'

9/7/2012 - 1:56 PM Expected Remote Options hash (VER=V4): 'a8f55717'

9/7/2012 - 1:56 PM UDPv4 link local: [undef]

9/7/2012 - 1:56 PM UDPv4 link remote: 178.248.30.131:443

9/7/2012 - 1:56 PM TLS: Initial packet from 178.248.30.131:443, sid=c2f61d23 f9740f16

9/7/2012 - 1:56 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 1:56 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 1:56 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 1:56 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 1:56 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 1:56 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 1:56 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 1:56 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/7/2012 - 1:56 PM [server] Peer Connection Initiated with 178.248.30.131:443

9/7/2012 - 1:56 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/7/2012 - 1:56 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.3.150 10.4.3.149'

9/7/2012 - 1:56 PM OPTIONS IMPORT: timers and/or timeouts modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: LZO parms modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: --ifconfig/up options modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: route options modified

9/7/2012 - 1:56 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

9/7/2012 - 1:56 PM ROUTE default_gateway=192.168.2.1

9/7/2012 - 1:56 PM TAP-WIN32 device [AirVpn] opened: \\.\Global\{3735E6B5-891A-4B19-845A-0287055EDE9C}.tap

9/7/2012 - 1:56 PM TAP-Win32 Driver Version 9.9

9/7/2012 - 1:56 PM TAP-Win32 MTU=1500

9/7/2012 - 1:56 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.3.150/255.255.255.252 on interface {3735E6B5-891A-4B19-845A-0287055EDE9C} [DHCP-serv: 10.4.3.149, lease-time: 31536000]

9/7/2012 - 1:56 PM Successful ARP Flush on interface [20] {3735E6B5-891A-4B19-845A-0287055EDE9C}

9/7/2012 - 1:56 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 178.248.30.131 MASK 255.255.255.255 192.168.2.1

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.149

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.149

9/7/2012 - 1:56 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/7/2012 - 1:56 PM Route addition via IPAPI succeeded [adaptive]

9/7/2012 - 1:56 PM Initialization Sequence Completed

9/7/2012 - 1:56 PM Starting Management Interface...

9/7/2012 - 1:56 PM Checking...

9/7/2012 - 1:56 PM Retrieve statistics...

9/7/2012 - 1:56 PM Connected.

9/7/2012 - 2:40 PM Replay-window backtrack occurred [19]

9/7/2012 - 2:40 PM Replay-window backtrack occurred [21]

9/7/2012 - 2:56 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 2:56 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 2:56 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 2:56 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 2:56 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 2:56 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 2:56 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 2:56 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/7/2012 - 3:02 PM Replay-window backtrack occurred [45]

9/7/2012 - 3:56 PM TLS: tls_process: killed expiring key

9/7/2012 - 3:56 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 3:56 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 3:56 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 3:56 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 3:56 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 3:56 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 3:56 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 3:56 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/7/2012 - 4:56 PM TLS: tls_process: killed expiring key

9/7/2012 - 4:56 PM TLS: soft reset sec=0 bytes=8294670216/0 pkts=8344203/0

9/7/2012 - 4:57 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 4:57 PM TLS Error: TLS handshake failed

9/7/2012 - 4:57 PM TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS ERROR: received control packet with stale session-id=c2f61d23 f9740f16

9/7/2012 - 4:57 PM TLS: Initial packet from 178.248.30.131:443, sid=e654d186 8da9ddcd

9/7/2012 - 4:58 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 4:58 PM TLS Error: TLS handshake failed

9/7/2012 - 4:58 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_CONTROL_V1)

9/7/2012 - 4:58 PM TLS: Initial packet from 178.248.30.131:443, sid=de5565ac 65de7921

9/7/2012 - 4:59 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 4:59 PM TLS Error: TLS handshake failed

9/7/2012 - 4:59 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_CONTROL_V1)

9/7/2012 - 4:59 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_CONTROL_V1)

9/7/2012 - 4:59 PM TLS: Initial packet from 178.248.30.131:443, sid=439c185c 28decf11

9/7/2012 - 5:00 PM TLS: new session incoming connection from 178.248.30.131:443

9/7/2012 - 5:00 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:00 PM TLS Error: TLS handshake failed

9/7/2012 - 5:00 PM TLS: Initial packet from 178.248.30.131:443, sid=4bb36981 f64c894c

9/7/2012 - 5:00 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 5:00 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 5:00 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 5:00 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 5:00 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 5:00 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 5:01 PM TLS: new session incoming connection from 178.248.30.131:443

9/7/2012 - 5:01 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:01 PM TLS Error: TLS handshake failed

9/7/2012 - 5:01 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:01 PM TLS Error: TLS handshake failed

9/7/2012 - 5:01 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:01 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:01 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:01 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:01 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:01 PM TLS: Initial packet from 178.248.30.131:443, sid=7fb8e338 36ca73b3

9/7/2012 - 5:02 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:02 PM TLS Error: TLS handshake failed

9/7/2012 - 5:03 PM TLS: Initial packet from 178.248.30.131:443, sid=d33628ca 5a3ee65c

9/7/2012 - 5:03 PM TLS: new session incoming connection from 178.248.30.131:443

9/7/2012 - 5:04 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:04 PM TLS Error: TLS handshake failed

9/7/2012 - 5:04 PM TLS: Initial packet from 178.248.30.131:443, sid=319f301a fea48dfb

9/7/2012 - 5:04 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 5:04 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 5:04 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 5:04 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 5:04 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 5:04 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 5:04 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:04 PM TLS Error: TLS handshake failed

9/7/2012 - 5:04 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_CONTROL_V1)

9/7/2012 - 5:04 PM TLS: new session incoming connection from 178.248.30.131:443

9/7/2012 - 5:05 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:05 PM TLS Error: TLS handshake failed

9/7/2012 - 5:05 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:05 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:05 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:05 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:05 PM TLS Error: Unroutable control packet received from 178.248.30.131:443 (si=3 op=P_ACK_V1)

9/7/2012 - 5:05 PM TLS: Initial packet from 178.248.30.131:443, sid=bb03c39b 7f698d01

9/7/2012 - 5:05 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 5:05 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 5:05 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 5:05 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/7/2012 - 5:05 PM VERIFY OK: nsCertType=SERVER

9/7/2012 - 5:05 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/7/2012 - 5:05 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 5:05 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 5:05 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/7/2012 - 5:05 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/7/2012 - 5:05 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/7/2012 - 5:05 PM TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

9/7/2012 - 5:05 PM TLS Error: TLS handshake failed

Share this post


Link to post

Hello!

The logs show various and severe connectivity problems from your client to our server. They are usually caused by extremely high latency and ISP line long (>60 seconds) dropouts.

First of all, please try a connection to a TCP port on different servers and compare the outcome.

We're looking forward to hearing from you.

Kind regards

Share this post


Link to post

update , used udp port 80 now, this is what ive had with udp 443 as of late >

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:47 PM Authenticate/Decrypt packet error: packet HMAC authentication failed

9/8/2012 - 5:48 PM Disconnecting...

9/8/2012 - 5:48 PM SIGTERM received, sending exit notification to peer

9/8/2012 - 5:48 PM TCP/UDP: Closing socket

9/8/2012 - 5:48 PM Disconnected.

9/8/2012 - 5:48 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.3.149

9/8/2012 - 5:48 PM Route deletion via IPAPI succeeded [adaptive]

9/8/2012 - 5:48 PM C:\WINDOWS\system32\route.exe DELETE 178.248.30.131 MASK 255.255.255.255 192.168.2.1

9/8/2012 - 5:48 PM Route deletion via IPAPI succeeded [adaptive]

9/8/2012 - 5:48 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.3.149

9/8/2012 - 5:48 PM Route deletion via IPAPI succeeded [adaptive]

9/8/2012 - 5:48 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.3.149

9/8/2012 - 5:48 PM Route deletion via IPAPI succeeded [adaptive]

9/8/2012 - 5:48 PM Closing TUN/TAP interface

9/8/2012 - 5:48 PM SIGTERM[hard,] received, process exiting

9/8/2012 - 5:48 PM Login...

9/8/2012 - 5:48 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:49 PM Login...

9/8/2012 - 5:49 PM Already connected.

9/8/2012 - 5:51 PM Login...

9/8/2012 - 5:51 PM Already connected.

9/8/2012 - 5:51 PM Login...

9/8/2012 - 5:51 PM Already connected.

9/8/2012 - 5:51 PM Login...

9/8/2012 - 5:51 PM Already connected.

9/8/2012 - 5:51 PM Login...

9/8/2012 - 5:51 PM Already connected.

9/8/2012 - 5:52 PM Login...

9/8/2012 - 5:52 PM Already connected.

9/8/2012 - 5:52 PM Login...

9/8/2012 - 5:52 PM Already connected.

9/8/2012 - 5:52 PM Login...

9/8/2012 - 5:52 PM Already connected.

9/8/2012 - 5:52 PM Login...

9/8/2012 - 5:52 PM Already connected.

9/8/2012 - 5:52 PM Login...

9/8/2012 - 5:52 PM Already connected.

9/8/2012 - 5:52 PM Login...

9/8/2012 - 5:52 PM Login success.

9/8/2012 - 5:52 PM Contacting service...

9/8/2012 - 5:52 PM Connecting...

9/8/2012 - 5:52 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

9/8/2012 - 5:52 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

9/8/2012 - 5:52 PM LZO compression initialized

9/8/2012 - 5:52 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

9/8/2012 - 5:52 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

9/8/2012 - 5:52 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

9/8/2012 - 5:52 PM Local Options hash (VER=V4): '22188c5b'

9/8/2012 - 5:52 PM Expected Remote Options hash (VER=V4): 'a8f55717'

9/8/2012 - 5:52 PM UDPv4 link local: [undef]

9/8/2012 - 5:52 PM UDPv4 link remote: 178.248.30.131:80

9/8/2012 - 5:52 PM TLS: Initial packet from 178.248.30.131:80, sid=1b77abf9 6104ebce

9/8/2012 - 5:53 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/8/2012 - 5:53 PM VERIFY OK: nsCertType=SERVER

9/8/2012 - 5:53 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/8/2012 - 5:53 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/8/2012 - 5:53 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/8/2012 - 5:53 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/8/2012 - 5:53 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/8/2012 - 5:53 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/8/2012 - 5:53 PM [server] Peer Connection Initiated with 178.248.30.131:80

9/8/2012 - 5:53 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/8/2012 - 5:53 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/8/2012 - 5:53 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.6.0.1,comp-lzo no,route 10.6.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.6.0.58 10.6.0.57'

9/8/2012 - 5:53 PM OPTIONS IMPORT: timers and/or timeouts modified

9/8/2012 - 5:53 PM OPTIONS IMPORT: LZO parms modified

9/8/2012 - 5:53 PM OPTIONS IMPORT: --ifconfig/up options modified

9/8/2012 - 5:53 PM OPTIONS IMPORT: route options modified

9/8/2012 - 5:53 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

9/8/2012 - 5:53 PM ROUTE default_gateway=192.168.2.1

9/8/2012 - 5:53 PM TAP-WIN32 device [AirVpn] opened: \\.\Global\{3735E6B5-891A-4B19-845A-0287055EDE9C}.tap

9/8/2012 - 5:53 PM TAP-Win32 Driver Version 9.9

9/8/2012 - 5:53 PM TAP-Win32 MTU=1500

9/8/2012 - 5:53 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.6.0.58/255.255.255.252 on interface {3735E6B5-891A-4B19-845A-0287055EDE9C} [DHCP-serv: 10.6.0.57, lease-time: 31536000]

9/8/2012 - 5:53 PM Successful ARP Flush on interface [19] {3735E6B5-891A-4B19-845A-0287055EDE9C}

9/8/2012 - 5:53 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

9/8/2012 - 5:53 PM C:\WINDOWS\system32\route.exe ADD 178.248.30.131 MASK 255.255.255.255 192.168.2.1

9/8/2012 - 5:53 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

9/8/2012 - 5:53 PM Route addition via IPAPI succeeded [adaptive]

9/8/2012 - 5:53 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.0.57

9/8/2012 - 5:53 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/8/2012 - 5:53 PM Route addition via IPAPI succeeded [adaptive]

9/8/2012 - 5:53 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.0.57

9/8/2012 - 5:53 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/8/2012 - 5:53 PM Route addition via IPAPI succeeded [adaptive]

9/8/2012 - 5:53 PM C:\WINDOWS\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.0.57

9/8/2012 - 5:53 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/8/2012 - 5:53 PM Route addition via IPAPI succeeded [adaptive]

9/8/2012 - 5:53 PM Initialization Sequence Completed

9/8/2012 - 5:53 PM Starting Management Interface...

9/8/2012 - 5:53 PM Checking...

9/8/2012 - 5:54 PM Retrieve statistics...

9/8/2012 - 5:54 PM Replay-window backtrack occurred [1]

9/8/2012 - 5:54 PM Connected.

we shall see how it goes if that dont do ill try port 53 then the tcp equivalents, and yes it does piss me off with the already logged in notification when im clearly NOT logged in

Share this post


Link to post

well its a pain in the ass really the last week and still testing ive found out no matter what port be it udp or tcp add in your portnr. of choice, on any netherland server gives less than optimal performance than used to be its ridiculous, exspecially on the swedish server side its a complete nightmare !!! that one wont even connect most of the times and if,then its sloooooowwwwww or wont work at all cause of the low speed you get , and ive tried this on my main rig with a complete airvpn uninstall reinstall and on a completely fresh installed windows 7 firewall disabled and only airvpn fresh install laptop , still the same so no its not the network settings since ive hadnt had this 2 weeks ago where the speeds was blazin and all was great as you all know , kinda pissed off now, heres a new log , once again speeds are still perfect without vpn , so it IS on airvpns side, and the funny thing about it is when i connect to a netherlands server its like fast then slooooww then fast then lots of sloooowwww seriously you know i love you guys but wtf! -.- , pardon my french and all i want is the swedish server to work perfectly but its not even usable look at its usage statistics nobodys using it hardly ,

9/13/2012 - 10:01 PM Expected Remote Options hash (VER=V4): 'a8f55717'

9/13/2012 - 10:01 PM UDPv4 link local: [undef]

9/13/2012 - 10:01 PM UDPv4 link remote: 95.211.98.154:443

9/13/2012 - 10:01 PM TLS: Initial packet from 95.211.98.154:443, sid=860cf936 3433873f

9/13/2012 - 10:01 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/13/2012 - 10:01 PM VERIFY OK: nsCertType=SERVER

9/13/2012 - 10:01 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/13/2012 - 10:01 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/13/2012 - 10:01 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/13/2012 - 10:01 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/13/2012 - 10:01 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/13/2012 - 10:01 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/13/2012 - 10:01 PM [server] Peer Connection Initiated with 95.211.98.154:443

9/13/2012 - 10:01 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/13/2012 - 10:02 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.21.86 10.4.21.85'

9/13/2012 - 10:02 PM OPTIONS IMPORT: timers and/or timeouts modified

9/13/2012 - 10:02 PM OPTIONS IMPORT: LZO parms modified

9/13/2012 - 10:02 PM OPTIONS IMPORT: --ifconfig/up options modified

9/13/2012 - 10:02 PM OPTIONS IMPORT: route options modified

9/13/2012 - 10:02 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

9/13/2012 - 10:02 PM ROUTE default_gateway=192.168.2.1

9/13/2012 - 10:02 PM TAP-WIN32 device [AirVpn] opened: \\.\Global\{960F10E2-8701-4D8B-B9D0-46CF00AB33C1}.tap

9/13/2012 - 10:02 PM TAP-Win32 Driver Version 9.9

9/13/2012 - 10:02 PM TAP-Win32 MTU=1500

9/13/2012 - 10:02 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.21.86/255.255.255.252 on interface {960F10E2-8701-4D8B-B9D0-46CF00AB33C1} [DHCP-serv: 10.4.21.85, lease-time: 31536000]

9/13/2012 - 10:02 PM Successful ARP Flush on interface [16] {960F10E2-8701-4D8B-B9D0-46CF00AB33C1}

9/13/2012 - 10:02 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

9/13/2012 - 10:02 PM C:\WINDOWS\system32\route.exe ADD 95.211.98.154 MASK 255.255.255.255 192.168.2.1

9/13/2012 - 10:02 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

9/13/2012 - 10:02 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:02 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.21.85

9/13/2012 - 10:02 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:02 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:02 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.21.85

9/13/2012 - 10:02 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:02 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:02 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.21.85

9/13/2012 - 10:02 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:02 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:02 PM Initialization Sequence Completed

9/13/2012 - 10:02 PM Starting Management Interface...

9/13/2012 - 10:02 PM Checking...

9/13/2012 - 10:02 PM Retrieve statistics...

9/13/2012 - 10:02 PM Connected.

9/13/2012 - 10:10 PM Disconnecting...

9/13/2012 - 10:10 PM SIGTERM received, sending exit notification to peer

9/13/2012 - 10:10 PM TCP/UDP: Closing socket

9/13/2012 - 10:10 PM Disconnected.

9/13/2012 - 10:10 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.21.85

9/13/2012 - 10:10 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:10 PM C:\WINDOWS\system32\route.exe DELETE 95.211.98.154 MASK 255.255.255.255 192.168.2.1

9/13/2012 - 10:10 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:10 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.21.85

9/13/2012 - 10:10 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:10 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.21.85

9/13/2012 - 10:10 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:10 PM Closing TUN/TAP interface

9/13/2012 - 10:10 PM SIGTERM[hard,] received, process exiting

9/13/2012 - 10:10 PM Login...

9/13/2012 - 10:10 PM Login success.

9/13/2012 - 10:10 PM Contacting service...

9/13/2012 - 10:10 PM Connecting...

9/13/2012 - 10:10 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

9/13/2012 - 10:10 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

9/13/2012 - 10:10 PM LZO compression initialized

9/13/2012 - 10:10 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

9/13/2012 - 10:10 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

9/13/2012 - 10:10 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

9/13/2012 - 10:10 PM Local Options hash (VER=V4): '22188c5b'

9/13/2012 - 10:10 PM Expected Remote Options hash (VER=V4): 'a8f55717'

9/13/2012 - 10:10 PM UDPv4 link local: [undef]

9/13/2012 - 10:10 PM UDPv4 link remote: 178.248.30.131:443

9/13/2012 - 10:10 PM TLS: Initial packet from 178.248.30.131:443, sid=74decbc6 fe48cd83

9/13/2012 - 10:11 PM Disconnecting...

9/13/2012 - 10:11 PM Disconnected.

9/13/2012 - 10:11 PM Login...

9/13/2012 - 10:11 PM Login success.

9/13/2012 - 10:11 PM Contacting service...

9/13/2012 - 10:11 PM Connecting...

9/13/2012 - 10:11 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

9/13/2012 - 10:11 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

9/13/2012 - 10:11 PM LZO compression initialized

9/13/2012 - 10:11 PM Control Channel MTU parms [ L:1560 D:140 EF:40 EB:0 ET:0 EL:0 ]

9/13/2012 - 10:11 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

9/13/2012 - 10:11 PM Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]

9/13/2012 - 10:11 PM Local Options hash (VER=V4): '958c5492'

9/13/2012 - 10:11 PM Expected Remote Options hash (VER=V4): '79ef4284'

9/13/2012 - 10:11 PM Attempting to establish TCP connection with 95.211.169.3:443

9/13/2012 - 10:11 PM TCP connection established with 95.211.169.3:443

9/13/2012 - 10:11 PM TCPv4_CLIENT link local: [undef]

9/13/2012 - 10:11 PM TCPv4_CLIENT link remote: 95.211.169.3:443

9/13/2012 - 10:11 PM TLS: Initial packet from 95.211.169.3:443, sid=4c8b4f37 7afa2c99

9/13/2012 - 10:11 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/13/2012 - 10:11 PM VERIFY OK: nsCertType=SERVER

9/13/2012 - 10:11 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/13/2012 - 10:11 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/13/2012 - 10:11 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/13/2012 - 10:11 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/13/2012 - 10:11 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/13/2012 - 10:11 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/13/2012 - 10:11 PM [server] Peer Connection Initiated with 95.211.169.3:443

9/13/2012 - 10:11 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/13/2012 - 10:11 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.5.0.1,comp-lzo no,route 10.5.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.5.0.22 10.5.0.21'

9/13/2012 - 10:11 PM OPTIONS IMPORT: timers and/or timeouts modified

9/13/2012 - 10:11 PM OPTIONS IMPORT: LZO parms modified

9/13/2012 - 10:11 PM OPTIONS IMPORT: --ifconfig/up options modified

9/13/2012 - 10:11 PM OPTIONS IMPORT: route options modified

9/13/2012 - 10:11 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

9/13/2012 - 10:11 PM ROUTE default_gateway=192.168.2.1

9/13/2012 - 10:11 PM TAP-WIN32 device [AirVpn] opened: \\.\Global\{960F10E2-8701-4D8B-B9D0-46CF00AB33C1}.tap

9/13/2012 - 10:11 PM TAP-Win32 Driver Version 9.9

9/13/2012 - 10:11 PM TAP-Win32 MTU=1500

9/13/2012 - 10:11 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.5.0.22/255.255.255.252 on interface {960F10E2-8701-4D8B-B9D0-46CF00AB33C1} [DHCP-serv: 10.5.0.21, lease-time: 31536000]

9/13/2012 - 10:11 PM Successful ARP Flush on interface [16] {960F10E2-8701-4D8B-B9D0-46CF00AB33C1}

9/13/2012 - 10:11 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

9/13/2012 - 10:11 PM C:\WINDOWS\system32\route.exe ADD 95.211.169.3 MASK 255.255.255.255 192.168.2.1

9/13/2012 - 10:11 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

9/13/2012 - 10:11 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:11 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.21

9/13/2012 - 10:11 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:11 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:11 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.21

9/13/2012 - 10:11 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:11 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:11 PM C:\WINDOWS\system32\route.exe ADD 10.5.0.1 MASK 255.255.255.255 10.5.0.21

9/13/2012 - 10:11 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:11 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:11 PM Initialization Sequence Completed

9/13/2012 - 10:11 PM Starting Management Interface...

9/13/2012 - 10:11 PM Checking...

9/13/2012 - 10:12 PM Retrieve statistics...

9/13/2012 - 10:12 PM Connected.

9/13/2012 - 10:20 PM write TCPv4_CLIENT: Software caused connection abort (WSAECONNABORTED) (code=10053)

9/13/2012 - 10:20 PM Connection reset, restarting [-1]

9/13/2012 - 10:20 PM TCP/UDP: Closing socket

9/13/2012 - 10:20 PM Re-connecting...

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe DELETE 10.5.0.1 MASK 255.255.255.255 10.5.0.21

9/13/2012 - 10:20 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe DELETE 95.211.169.3 MASK 255.255.255.255 192.168.2.1

9/13/2012 - 10:20 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.21

9/13/2012 - 10:20 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.21

9/13/2012 - 10:20 PM Route deletion via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM Closing TUN/TAP interface

9/13/2012 - 10:20 PM SIGUSR1[soft,connection-reset] received, process restarting

9/13/2012 - 10:20 PM Restart pause, 5 second(s)

9/13/2012 - 10:20 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

9/13/2012 - 10:20 PM LZO compression initialized

9/13/2012 - 10:20 PM Control Channel MTU parms [ L:1560 D:140 EF:40 EB:0 ET:0 EL:0 ]

9/13/2012 - 10:20 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

9/13/2012 - 10:20 PM Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]

9/13/2012 - 10:20 PM Local Options hash (VER=V4): '958c5492'

9/13/2012 - 10:20 PM Expected Remote Options hash (VER=V4): '79ef4284'

9/13/2012 - 10:20 PM Attempting to establish TCP connection with 95.211.169.3:443

9/13/2012 - 10:20 PM TCP connection established with 95.211.169.3:443

9/13/2012 - 10:20 PM TCPv4_CLIENT link local: [undef]

9/13/2012 - 10:20 PM TCPv4_CLIENT link remote: 95.211.169.3:443

9/13/2012 - 10:20 PM TLS: Initial packet from 95.211.169.3:443, sid=9175e688 9565ea8d

9/13/2012 - 10:20 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

9/13/2012 - 10:20 PM VERIFY OK: nsCertType=SERVER

9/13/2012 - 10:20 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

9/13/2012 - 10:20 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/13/2012 - 10:20 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/13/2012 - 10:20 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

9/13/2012 - 10:20 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

9/13/2012 - 10:20 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

9/13/2012 - 10:20 PM [server] Peer Connection Initiated with 95.211.169.3:443

9/13/2012 - 10:20 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

9/13/2012 - 10:20 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.5.0.1,comp-lzo no,route 10.5.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.5.0.22 10.5.0.21'

9/13/2012 - 10:20 PM OPTIONS IMPORT: timers and/or timeouts modified

9/13/2012 - 10:20 PM OPTIONS IMPORT: LZO parms modified

9/13/2012 - 10:20 PM OPTIONS IMPORT: --ifconfig/up options modified

9/13/2012 - 10:20 PM OPTIONS IMPORT: route options modified

9/13/2012 - 10:20 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

9/13/2012 - 10:20 PM ROUTE default_gateway=192.168.2.1

9/13/2012 - 10:20 PM TAP-WIN32 device [AirVpn] opened: \\.\Global\{960F10E2-8701-4D8B-B9D0-46CF00AB33C1}.tap

9/13/2012 - 10:20 PM TAP-Win32 Driver Version 9.9

9/13/2012 - 10:20 PM TAP-Win32 MTU=1500

9/13/2012 - 10:20 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.5.0.22/255.255.255.252 on interface {960F10E2-8701-4D8B-B9D0-46CF00AB33C1} [DHCP-serv: 10.5.0.21, lease-time: 31536000]

9/13/2012 - 10:20 PM Successful ARP Flush on interface [16] {960F10E2-8701-4D8B-B9D0-46CF00AB33C1}

9/13/2012 - 10:20 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe ADD 95.211.169.3 MASK 255.255.255.255 192.168.2.1

9/13/2012 - 10:20 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

9/13/2012 - 10:20 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.21

9/13/2012 - 10:20 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:20 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.21

9/13/2012 - 10:20 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:20 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM C:\WINDOWS\system32\route.exe ADD 10.5.0.1 MASK 255.255.255.255 10.5.0.21

9/13/2012 - 10:20 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

9/13/2012 - 10:20 PM Route addition via IPAPI succeeded [adaptive]

9/13/2012 - 10:20 PM Initialization Sequence Completed

9/13/2012 - 10:20 PM Starting Management Interface...

9/13/2012 - 10:20 PM Checking...

9/13/2012 - 10:21 PM Retrieve statistics...

9/13/2012 - 10:21 PM Connected.

Share this post


Link to post

well its a pain in the ass really the last week and still testing ive found out no matter what port be it udp or tcp add in your portnr. of choice, on any netherland server gives less than optimal performance than used to be its ridiculous, exspecially on the swedish server side its a complete nightmare !!! that one wont even connect most of the times and if,then its sloooooowwwwww or wont work at all cause of the low speed you get , and ive tried this on my main rig with a complete airvpn uninstall reinstall and on a completely fresh installed windows 7 firewall disabled and only airvpn fresh install laptop , still the same so no its not the network settings since ive hadnt had this 2 weeks ago where the speeds was blazin and all was great as you all know , kinda pissed off now, heres a new log , once again speeds are still perfect without vpn , so it IS on airvpns side

Hello!

The peering of our servers datacenters did not change in the last 2 weeks and the recorded performance is as high as usual. Furthermore we also added more bw redundancy. Please note that:

- our NL and DE servers are in datacenters with POPs directly connected to tier1 providers with high bandwidth redundancy

- you find the very same problem on different datacenters and networks

- 2 weeks ago you recorded "blazing speeds"

- you record high performance during the first minutes, then you lose connection or you have very high packet loss

Therefore and unfortunately everything, really everything, suggests that it is a problem either of your ISP (or the ISP of your ISP etc.) or maybe of your last-mile, born during the last 2 weeks, Unfortunately, in this case, there's nothing we can do. If it was a fault on our side, we could work on it, but given the information you provided the problem is on your side and we are powerless. Just to try all the options, maybe it is not your ISP fault, but only a faulty router which shows the defect especially during tunneling (you would hardly notice dropouts without tunneling).

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...