dumbo9696 0 Posted ... Hello, I have never had any issues with my connection until today. I would be a newbie in VPN speak,, But I just notice when the VPN tries to check route . It send a sigterm command to kill the connection.. I have full subs and maybe someone can help identify the issue in my logs? I am sorry if this is in the incorrect location to post this in advance.. Any help would be great..I 2019.10.19 08:08:22 - AirVPN client version: 2.9.2, System: OSX, Name: 10.10.5, Architecture: x64. 2019.10.19 08:08:22 - Reading options from /Users/homepc/.airvpn/AirVPN.xml. 2019.10.19 08:08:22 - Data Path: /Users/homepc/.airvpn. 2019.10.19 08:08:22 - App Path: /Users/homepc/Downloads/AirVPN.app/Contents/MacOS. 2019.10.19 08:08:22 - Executable Path: /Users/homepc/Downloads/AirVPN.app/Contents/MacOS/AirVPN. 2019.10.19 08:08:22 - Command line arguments (0):. 2019.10.19 08:08:22 - Operating System: Unix 14.5.0.0 - Darwin Homes-Mac-mini 14.5.0 Darwin Kernel Version 14.5.0: Sun Jun 4 21:40:08 PDT 2017; root:xnu-2782.70.3~1/RELEASE_X86_64 x86_64. 2019.10.19 08:08:22 - Updating systems & servers data ...I 2019.10.19 08:08:23 - OpenVPN Driver - ExpectedI 2019.10.19 08:08:23 - OpenVPN - Version: OpenVPN 2.3.6 (/Users/homepc/Downloads/AirVPN.app/Contents/MacOS/openvpn)I 2019.10.19 08:08:23 - SSH - Version: OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 (/usr/bin/ssh)I 2019.10.19 08:08:23 - SSL - Version: stunnel 5.09 (/Users/homepc/Downloads/AirVPN.app/Contents/MacOS/stunnel)I 2019.10.19 08:08:23 - Session starting.I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Bluetooth DUN)I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Ethernet)I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Wi-Fi)I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Bluetooth PAN). 2019.10.19 08:08:23 - Systems & servers data update completedI 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2019.10.19 08:08:31 - Checking authorization ...! 2019.10.19 08:08:31 - Connecting to Alpheratz (Netherlands, Alblasserdam). 2019.10.19 08:08:31 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Jan 12 2015. 2019.10.19 08:08:31 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2019.10.19 08:08:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.10.19 08:08:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2019.10.19 08:08:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:08:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:08:31 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]. 2019.10.19 08:08:31 - OpenVPN > UDPv4 link local: [undef]. 2019.10.19 08:08:31 - OpenVPN > UDPv4 link remote: [AF_INET]134.19.179.242:443. 2019.10.19 08:08:31 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.242:443, sid=6a004914 19ba2336. 2019.10.19 08:08:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2019.10.19 08:08:31 - OpenVPN > Validating certificate key usage. 2019.10.19 08:08:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2019.10.19 08:08:31 - OpenVPN > VERIFY KU OK. 2019.10.19 08:08:31 - OpenVPN > Validating certificate extended key usage. 2019.10.19 08:08:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2019.10.19 08:08:31 - OpenVPN > VERIFY EKU OK. 2019.10.19 08:08:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org. 2019.10.19 08:08:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.10.19 08:08:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:08:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.10.19 08:08:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:08:32 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2019.10.19 08:08:32 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.242:443. 2019.10.19 08:08:34 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1). 2019.10.19 08:08:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.32.196.1,route-gateway 10.32.196.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.32.196.187 255.255.255.0,peer-id 21'. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: peer-id set. 2019.10.19 08:08:34 - OpenVPN > Opened utun device utun0. 2019.10.19 08:08:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2019.10.19 08:08:34 - OpenVPN > /sbin/ifconfig utun0 delete. 2019.10.19 08:08:34 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2019.10.19 08:08:34 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2019.10.19 08:08:34 - OpenVPN > /sbin/ifconfig utun0 10.32.196.187 10.32.196.187 netmask 255.255.255.0 mtu 1500 up. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 10.32.196.0 10.32.196.187 255.255.255.0. 2019.10.19 08:08:34 - OpenVPN > add net 10.32.196.0: gateway 10.32.196.187. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 134.19.179.242 192.168.1.1 255.255.255.255. 2019.10.19 08:08:34 - OpenVPN > add net 134.19.179.242: gateway 192.168.1.1. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 0.0.0.0 10.32.196.1 128.0.0.0. 2019.10.19 08:08:34 - OpenVPN > add net 0.0.0.0: gateway 10.32.196.1. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 128.0.0.0 10.32.196.1 128.0.0.0. 2019.10.19 08:08:34 - OpenVPN > add net 128.0.0.0: gateway 10.32.196.1. 2019.10.19 08:08:34 - Starting Management Interface. 2019.10.19 08:08:34 - OpenVPN > Initialization Sequence CompletedI 2019.10.19 08:08:34 - DNS of a network adapter forced (Bluetooth DUN)I 2019.10.19 08:08:34 - DNS of a network adapter forced (Ethernet)I 2019.10.19 08:08:34 - DNS of a network adapter forced (Wi-Fi)I 2019.10.19 08:08:34 - DNS of a network adapter forced (Bluetooth PAN)I 2019.10.19 08:08:34 - DNS of a network adapter forced (Thunderbolt Bridge)I 2019.10.19 08:08:34 - Flushing DNSI 2019.10.19 08:08:35 - Checking routeW 2019.10.19 08:09:05 - The request timed out! 2019.10.19 08:09:05 - Disconnecting. 2019.10.19 08:09:05 - Management - Send 'signal SIGTERM'. 2019.10.19 08:09:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2019.10.19 08:09:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2019.10.19 08:09:05 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2019.10.19 08:09:05 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.10.19 08:09:09 - OpenVPN > TLS: new session incoming connection from [AF_INET]134.19.179.242:443. 2019.10.19 08:09:10 - OpenVPN > /sbin/route delete -net 134.19.179.242 192.168.1.1 255.255.255.255. 2019.10.19 08:09:10 - OpenVPN > delete net 134.19.179.242: gateway 192.168.1.1. 2019.10.19 08:09:11 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.32.196.1 128.0.0.0. 2019.10.19 08:09:11 - OpenVPN > delete net 0.0.0.0: gateway 10.32.196.1. 2019.10.19 08:09:11 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.32.196.1 128.0.0.0. 2019.10.19 08:09:11 - OpenVPN > delete net 128.0.0.0: gateway 10.32.196.1. 2019.10.19 08:09:11 - OpenVPN > Closing TUN/TAP interface. 2019.10.19 08:09:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2019.10.19 08:09:11 - Connection terminated.I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Bluetooth DUN)I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Ethernet)I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Wi-Fi)I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2019.10.19 08:09:14 - Checking authorization ...! 2019.10.19 08:09:14 - Connecting to Alpheratz (Netherlands, Alblasserdam). 2019.10.19 08:09:14 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Jan 12 2015. 2019.10.19 08:09:14 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2019.10.19 08:09:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.10.19 08:09:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2019.10.19 08:09:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:09:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:09:14 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]. 2019.10.19 08:09:14 - OpenVPN > UDPv4 link local: [undef]. 2019.10.19 08:09:14 - OpenVPN > UDPv4 link remote: [AF_INET]134.19.179.242:443. 2019.10.19 08:09:14 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.242:443, sid=47fed691 e207e817. 2019.10.19 08:09:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2019.10.19 08:09:14 - OpenVPN > Validating certificate key usage. 2019.10.19 08:09:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2019.10.19 08:09:15 - OpenVPN > VERIFY KU OK. 2019.10.19 08:09:15 - OpenVPN > Validating certificate extended key usage. 2019.10.19 08:09:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2019.10.19 08:09:15 - OpenVPN > VERIFY EKU OK. 2019.10.19 08:09:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org. 2019.10.19 08:09:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.10.19 08:09:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:09:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.10.19 08:09:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.10.19 08:09:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2019.10.19 08:09:15 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.242:443. 2019.10.19 08:09:17 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1). 2019.10.19 08:09:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.32.196.1,route-gateway 10.32.196.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.32.196.187 255.255.255.0,peer-id 31'. 2019.10.19 08:09:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: peer-id set. 2019.10.19 08:09:17 - OpenVPN > Opened utun device utun0. 2019.10.19 08:09:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2019.10.19 08:09:18 - OpenVPN > /sbin/ifconfig utun0 delete. 2019.10.19 08:09:18 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2019.10.19 08:09:18 - OpenVPN > /sbin/ifconfig utun0 10.32.196.187 10.32.196.187 netmask 255.255.255.0 mtu 1500 up. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 10.32.196.0 10.32.196.187 255.255.255.0. 2019.10.19 08:09:18 - OpenVPN > add net 10.32.196.0: gateway 10.32.196.187. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 134.19.179.242 192.168.1.1 255.255.255.255. 2019.10.19 08:09:18 - OpenVPN > add net 134.19.179.242: gateway 192.168.1.1. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 0.0.0.0 10.32.196.1 128.0.0.0. 2019.10.19 08:09:18 - OpenVPN > add net 0.0.0.0: gateway 10.32.196.1. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 128.0.0.0 10.32.196.1 128.0.0.0. 2019.10.19 08:09:18 - OpenVPN > add net 128.0.0.0: gateway 10.32.196.1. 2019.10.19 08:09:18 - Starting Management Interface. 2019.10.19 08:09:18 - OpenVPN > Initialization Sequence CompletedI 2019.10.19 08:09:19 - DNS of a network adapter forced (Bluetooth DUN)I 2019.10.19 08:09:19 - DNS of a network adapter forced (Ethernet)I 2019.10.19 08:09:19 - DNS of a network adapter forced (Wi-Fi)I 2019.10.19 08:09:19 - DNS of a network adapter forced (Bluetooth PAN)I 2019.10.19 08:09:19 - DNS of a network adapter forced (Thunderbolt Bridge)I 2019.10.19 08:09:19 - Flushing DNSI 2019.10.19 08:09:19 - Checking routeW 2019.10.19 08:10:09 - The request timed out! 2019.10.19 08:10:09 - Disconnecting. 2019.10.19 08:10:09 - Management - Send 'signal SIGTERM'. 2019.10.19 08:10:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2019.10.19 08:10:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2019.10.19 08:10:09 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.10.19 08:10:14 - OpenVPN > /sbin/route delete -net 134.19.179.242 192.168.1.1 255.255.255.255. 2019.10.19 08:10:14 - OpenVPN > delete net 134.19.179.242: gateway 192.168.1.1. 2019.10.19 08:10:14 - Connection terminated.I 2019.10.19 08:10:14 - DNS of a network adapter restored to original settings (Bluetooth DUN). 2019.10.19 08:10:14 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.32.196.1 128.0.0.0. 2019.10.19 08:10:14 - OpenVPN > delete net 0.0.0.0: gateway 10.32.196.1I 2019.10.19 08:10:14 - DNS of a network adapter restored to original settings (Ethernet). 2019.10.19 08:10:14 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.32.196.1 128.0.0.0I 2019.10.19 08:10:14 - DNS of a network adapter restored to original settings (Wi-Fi). 2019.10.19 08:10:15 - OpenVPN > delete net 128.0.0.0: gateway 10.32.196.1I 2019.10.19 08:10:15 - DNS of a network adapter restored to original settings (Bluetooth PAN). 2019.10.19 08:10:15 - OpenVPN > Closing TUN/TAP interfaceI 2019.10.19 08:10:15 - DNS of a network adapter restored to original settings (Thunderbolt Bridge). 2019.10.19 08:10:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2019.10.19 08:10:15 - Cancel requested.I 2019.10.19 08:10:15 - IPv6 restored on network adapter (Bluetooth DUN)I 2019.10.19 08:10:15 - IPv6 restored on network adapter (Ethernet)I 2019.10.19 08:10:15 - IPv6 restored on network adapter (Wi-Fi)I 2019.10.19 08:10:16 - IPv6 restored on network adapter (Bluetooth PAN)I 2019.10.19 08:10:16 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2019.10.19 08:10:16 - Session terminated. Quote Share this post Link to post
Flx 76 Posted ... Confirmed. PortFowarding not working. Connected Session or servers do not register/appear in Profile/Overview. Vanilla/Native OpenVPN sessions/established connections not affected. Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
dumbo9696 0 Posted ... Hello Flx, Thanks for answer.. How to do fix it.. ? I have had never had to do port forwarding before ? Quote Share this post Link to post
Flx 76 Posted ... 7 minutes ago, dumbo9696 said: How to do fix it.. ? You can't from client-side. Staff/Admins will have to fix/address this "bug/issue". Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
dumbo9696 0 Posted ... @ Flx I was able to connect using tunnelblick and creating an AirVPN configuration file. Would that confirm your thought on port forward issue? Quote Share this post Link to post
Flx 76 Posted ... 2 minutes ago, dumbo9696 said: I was able to connect using tunnelblick and creating an AirVPN configuration file. Would that confirm your thought on port forward issue? Great. Do/Can you see the Connected Server/Session in Profile/Overview? Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Flx 76 Posted ... 7 minutes ago, dumbo9696 said: is this a common "bug". It did happen before. Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
dumbo9696 0 Posted ... As said before Im a newbie..sorry. At the minute I have a client and a tunnelblick open.. The client doesn't connected and I sent the log. Do you want the log from the tunnickblick? Quote Share this post Link to post
dumbo9696 0 Posted ... 14 minutes ago, Flx said: Great. Do/Can you see the Connected Server/Session in Profile/Overview? i can see same server in the client and when i try to connect it fails using client ,but works using tunnelblick.. Quote Share this post Link to post
Flx 76 Posted ... 3 minutes ago, dumbo9696 said: i can see same server in the client When you login @ airvpn.org in the browser Not Eddie app. Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
dumbo9696 0 Posted ... FLX .. It is fixed now I just reinstalled the eddie client and it works 100% .. (Schoolboy error) . I had the older version. It must of stop working.. Thanks for making the time and helping me.. !!! Quote Share this post Link to post
Flx 76 Posted ... 3 minutes ago, dumbo9696 said: FLX .. It is fixed now I just reinstalled the eddie client and it works 100% .. (Schoolboy error) . I had the older version. It must of stop working.. Thanks for making the time and helping me.. !!! Is port forwarding working as well? Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
dumbo9696 0 Posted ... not sure- where do i check that? see log I 2019.10.19 10:50:08 - Session starting. I 2019.10.19 10:50:08 - Checking authorization ... ! 2019.10.19 10:50:09 - Connecting to Alchiba (Netherlands, Alblasserdam) . 2019.10.19 10:50:09 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2019.10.19 10:50:09 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.10.19 10:50:09 - Connection to OpenVPN Management Interface . 2019.10.19 10:50:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.10.19 10:50:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.19 10:50:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.19 10:50:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.19 10:50:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.19 10:50:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.183:443 . 2019.10.19 10:50:09 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144] . 2019.10.19 10:50:09 - OpenVPN > UDP link local: (not bound) . 2019.10.19 10:50:09 - OpenVPN > UDP link remote: [AF_INET]213.152.161.183:443 . 2019.10.19 10:50:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.10.19 10:50:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.183:443, sid=9912d22d 5e2ff042 . 2019.10.19 10:50:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.10.19 10:50:09 - OpenVPN > VERIFY KU OK . 2019.10.19 10:50:09 - OpenVPN > Validating certificate extended key usage . 2019.10.19 10:50:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.10.19 10:50:09 - OpenVPN > VERIFY EKU OK . 2019.10.19 10:50:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2019.10.19 10:50:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.10.19 10:50:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.183:443 . 2019.10.19 10:50:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2019.10.19 10:50:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.134.1,dhcp-option DNS6 fde6:7a:7d20:186::1,tun-ipv6,route-gateway 10.5.134.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:186::108e/64 fde6:7a:7d20:186::1,ifconfig 10.5.134.144 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2019.10.19 10:50:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.10.19 10:50:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.10.19 10:50:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.19 10:50:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.19 10:50:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=en0 HWADDR=ac:87:a3:07:c6:68 . 2019.10.19 10:50:11 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.10.19 10:50:11 - OpenVPN > GDG6: problem writing to routing socket . 2019.10.19 10:50:11 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2019.10.19 10:50:11 - OpenVPN > Opened utun device utun0 . 2019.10.19 10:50:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.10.19 10:50:11 - OpenVPN > /sbin/ifconfig utun0 delete . 2019.10.19 10:50:11 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2019.10.19 10:50:11 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2019.10.19 10:50:11 - OpenVPN > /sbin/ifconfig utun0 10.5.134.144 10.5.134.144 netmask 255.255.255.0 mtu 1500 up . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 10.5.134.0 10.5.134.144 255.255.255.0 . 2019.10.19 10:50:11 - OpenVPN > add net 10.5.134.0: gateway 10.5.134.144 . 2019.10.19 10:50:11 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:186::108e/64 . 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(fde6:7a:7d20:186::/64 -> fde6:7a:7d20:186::108e metric 0) dev utun0 . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:186:: -prefixlen 64 -iface utun0 . 2019.10.19 10:50:11 - OpenVPN > add net fde6:7a:7d20:186::: gateway utun0: File exists . 2019.10.19 10:50:11 - OpenVPN > route: writing to routing socket: File exists . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 213.152.161.183 192.168.1.1 255.255.255.255 . 2019.10.19 10:50:11 - OpenVPN > add net 213.152.161.183: gateway 192.168.1.1 . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 0.0.0.0 10.5.134.1 128.0.0.0 . 2019.10.19 10:50:11 - OpenVPN > add net 0.0.0.0: gateway 10.5.134.1 . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 128.0.0.0 10.5.134.1 128.0.0.0 . 2019.10.19 10:50:11 - OpenVPN > add net 128.0.0.0: gateway 10.5.134.1 . 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:186::1 metric -1) dev utun0 . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0 . 2019.10.19 10:50:11 - OpenVPN > add net ::: gateway utun0 . 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:186::1 metric -1) dev utun0 . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0 . 2019.10.19 10:50:11 - OpenVPN > add net 2000::: gateway utun0 . 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:186::1 metric -1) dev utun0 . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0 . 2019.10.19 10:50:11 - OpenVPN > add net 3000::: gateway utun0 . 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:186::1 metric -1) dev utun0 . 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0 . 2019.10.19 10:50:11 - OpenVPN > add net fc00::: gateway utun0 . 2019.10.19 10:50:11 - DNS of a network adapter forced (Bluetooth DUN, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1) . 2019.10.19 10:50:11 - DNS of a network adapter forced (Ethernet, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1) . 2019.10.19 10:50:12 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1) . 2019.10.19 10:50:12 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1) . 2019.10.19 10:50:12 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1) . 2019.10.19 10:50:12 - Routes, added a new route, 213.152.161.181 for gateway 10.5.134.1 . 2019.10.19 10:50:12 - Routes, added a new route, 2a00:1678:2470:19:9016:df76:43b5:703e for gateway fde6:7a:7d20:186::1 . 2019.10.19 10:50:12 - Flushing DNS I 2019.10.19 10:50:12 - Checking route IPv4 I 2019.10.19 10:50:12 - Checking route IPv6 I 2019.10.19 10:50:13 - Checking DNS ! 2019.10.19 10:50:13 - Connected. . 2019.10.19 10:50:14 - OpenVPN > Initialization Sequence Completed ! 2019.10.19 10:50:18 - Disconnecting . 2019.10.19 10:50:19 - Routes, removed a route previously added, 213.152.161.181 for gateway 10.5.134.1 . 2019.10.19 10:50:19 - Routes, removed a route previously added, 2a00:1678:2470:19:9016:df76:43b5:703e for gateway fde6:7a:7d20:186::1 . 2019.10.19 10:50:19 - Sending management termination signal . 2019.10.19 10:50:19 - Management - Send 'signal SIGTERM' . 2019.10.19 10:50:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.10.19 10:50:19 - OpenVPN > SIGTERM received, sending exit notification to peer Quote Share this post Link to post
Flx 76 Posted ... 1 hour ago, dumbo9696 said: not sure- where do i check that? As of now Everything is back to normal. Yup everything is working as intended.😀 Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post