Jump to content
Not connected, Your IP: 3.233.224.8
Sign in to follow this  
dumbo9696

Connection failing

Recommended Posts

Hello,

I have never had any issues with my connection until today. I would be a newbie in VPN speak,, But I just notice when the VPN tries to check route . It send a sigterm command to kill the connection.. I have full subs and maybe someone can help identify the issue in my logs? I am sorry if this is in the incorrect location to post this in advance..

Any help would be great..

I 2019.10.19 08:08:22 - AirVPN client version: 2.9.2, System: OSX, Name: 10.10.5, Architecture: x64
. 2019.10.19 08:08:22 - Reading options from /Users/homepc/.airvpn/AirVPN.xml
. 2019.10.19 08:08:22 - Data Path: /Users/homepc/.airvpn
. 2019.10.19 08:08:22 - App Path: /Users/homepc/Downloads/AirVPN.app/Contents/MacOS
. 2019.10.19 08:08:22 - Executable Path: /Users/homepc/Downloads/AirVPN.app/Contents/MacOS/AirVPN
. 2019.10.19 08:08:22 - Command line arguments (0):
. 2019.10.19 08:08:22 - Operating System: Unix 14.5.0.0 - Darwin Homes-Mac-mini 14.5.0 Darwin Kernel Version 14.5.0: Sun Jun  4 21:40:08 PDT 2017; root:xnu-2782.70.3~1/RELEASE_X86_64 x86_64
. 2019.10.19 08:08:22 - Updating systems & servers data ...
I 2019.10.19 08:08:23 - OpenVPN Driver - Expected
I 2019.10.19 08:08:23 - OpenVPN - Version: OpenVPN 2.3.6 (/Users/homepc/Downloads/AirVPN.app/Contents/MacOS/openvpn)
I 2019.10.19 08:08:23 - SSH - Version: OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 (/usr/bin/ssh)
I 2019.10.19 08:08:23 - SSL - Version: stunnel 5.09 (/Users/homepc/Downloads/AirVPN.app/Contents/MacOS/stunnel)
I 2019.10.19 08:08:23 - Session starting.
I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Ethernet)
I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Wi-Fi)
I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Bluetooth PAN)
. 2019.10.19 08:08:23 - Systems & servers data update completed
I 2019.10.19 08:08:23 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2019.10.19 08:08:31 - Checking authorization ...
! 2019.10.19 08:08:31 - Connecting to Alpheratz (Netherlands, Alblasserdam)
. 2019.10.19 08:08:31 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Jan 12 2015
. 2019.10.19 08:08:31 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08
. 2019.10.19 08:08:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.10.19 08:08:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2019.10.19 08:08:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:08:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:08:31 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2019.10.19 08:08:31 - OpenVPN > UDPv4 link local: [undef]
. 2019.10.19 08:08:31 - OpenVPN > UDPv4 link remote: [AF_INET]134.19.179.242:443
. 2019.10.19 08:08:31 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.242:443, sid=6a004914 19ba2336
. 2019.10.19 08:08:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.10.19 08:08:31 - OpenVPN > Validating certificate key usage
. 2019.10.19 08:08:31 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2019.10.19 08:08:31 - OpenVPN > VERIFY KU OK
. 2019.10.19 08:08:31 - OpenVPN > Validating certificate extended key usage
. 2019.10.19 08:08:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.10.19 08:08:31 - OpenVPN > VERIFY EKU OK
. 2019.10.19 08:08:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org
. 2019.10.19 08:08:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.10.19 08:08:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:08:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.10.19 08:08:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:08:32 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2019.10.19 08:08:32 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.242:443
. 2019.10.19 08:08:34 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1)
. 2019.10.19 08:08:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.32.196.1,route-gateway 10.32.196.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.32.196.187 255.255.255.0,peer-id 21'
. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.10.19 08:08:34 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.10.19 08:08:34 - OpenVPN > Opened utun device utun0
. 2019.10.19 08:08:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2019.10.19 08:08:34 - OpenVPN > /sbin/ifconfig utun0 delete
. 2019.10.19 08:08:34 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2019.10.19 08:08:34 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2019.10.19 08:08:34 - OpenVPN > /sbin/ifconfig utun0 10.32.196.187 10.32.196.187 netmask 255.255.255.0 mtu 1500 up
. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 10.32.196.0 10.32.196.187 255.255.255.0
. 2019.10.19 08:08:34 - OpenVPN > add net 10.32.196.0: gateway 10.32.196.187
. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 134.19.179.242 192.168.1.1 255.255.255.255
. 2019.10.19 08:08:34 - OpenVPN > add net 134.19.179.242: gateway 192.168.1.1
. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 0.0.0.0 10.32.196.1 128.0.0.0
. 2019.10.19 08:08:34 - OpenVPN > add net 0.0.0.0: gateway 10.32.196.1
. 2019.10.19 08:08:34 - OpenVPN > /sbin/route add -net 128.0.0.0 10.32.196.1 128.0.0.0
. 2019.10.19 08:08:34 - OpenVPN > add net 128.0.0.0: gateway 10.32.196.1
. 2019.10.19 08:08:34 - Starting Management Interface
. 2019.10.19 08:08:34 - OpenVPN > Initialization Sequence Completed
I 2019.10.19 08:08:34 - DNS of a network adapter forced (Bluetooth DUN)
I 2019.10.19 08:08:34 - DNS of a network adapter forced (Ethernet)
I 2019.10.19 08:08:34 - DNS of a network adapter forced (Wi-Fi)
I 2019.10.19 08:08:34 - DNS of a network adapter forced (Bluetooth PAN)
I 2019.10.19 08:08:34 - DNS of a network adapter forced (Thunderbolt Bridge)
I 2019.10.19 08:08:34 - Flushing DNS
I 2019.10.19 08:08:35 - Checking route
W 2019.10.19 08:09:05 - The request timed out
! 2019.10.19 08:09:05 - Disconnecting
. 2019.10.19 08:09:05 - Management - Send 'signal SIGTERM'
. 2019.10.19 08:09:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.10.19 08:09:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2019.10.19 08:09:05 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2019.10.19 08:09:05 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.10.19 08:09:09 - OpenVPN > TLS: new session incoming connection from [AF_INET]134.19.179.242:443
. 2019.10.19 08:09:10 - OpenVPN > /sbin/route delete -net 134.19.179.242 192.168.1.1 255.255.255.255
. 2019.10.19 08:09:10 - OpenVPN > delete net 134.19.179.242: gateway 192.168.1.1
. 2019.10.19 08:09:11 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.32.196.1 128.0.0.0
. 2019.10.19 08:09:11 - OpenVPN > delete net 0.0.0.0: gateway 10.32.196.1
. 2019.10.19 08:09:11 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.32.196.1 128.0.0.0
. 2019.10.19 08:09:11 - OpenVPN > delete net 128.0.0.0: gateway 10.32.196.1
. 2019.10.19 08:09:11 - OpenVPN > Closing TUN/TAP interface
. 2019.10.19 08:09:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2019.10.19 08:09:11 - Connection terminated.
I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Bluetooth DUN)
I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Ethernet)
I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2019.10.19 08:09:11 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)
I 2019.10.19 08:09:14 - Checking authorization ...
! 2019.10.19 08:09:14 - Connecting to Alpheratz (Netherlands, Alblasserdam)
. 2019.10.19 08:09:14 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Jan 12 2015
. 2019.10.19 08:09:14 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08
. 2019.10.19 08:09:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.10.19 08:09:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2019.10.19 08:09:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:09:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:09:14 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2019.10.19 08:09:14 - OpenVPN > UDPv4 link local: [undef]
. 2019.10.19 08:09:14 - OpenVPN > UDPv4 link remote: [AF_INET]134.19.179.242:443
. 2019.10.19 08:09:14 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.242:443, sid=47fed691 e207e817
. 2019.10.19 08:09:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.10.19 08:09:14 - OpenVPN > Validating certificate key usage
. 2019.10.19 08:09:15 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2019.10.19 08:09:15 - OpenVPN > VERIFY KU OK
. 2019.10.19 08:09:15 - OpenVPN > Validating certificate extended key usage
. 2019.10.19 08:09:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.10.19 08:09:15 - OpenVPN > VERIFY EKU OK
. 2019.10.19 08:09:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org
. 2019.10.19 08:09:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.10.19 08:09:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:09:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.10.19 08:09:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.10.19 08:09:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2019.10.19 08:09:15 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.242:443
. 2019.10.19 08:09:17 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1)
. 2019.10.19 08:09:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.32.196.1,route-gateway 10.32.196.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.32.196.187 255.255.255.0,peer-id 31'
. 2019.10.19 08:09:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: route options modified
. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.10.19 08:09:17 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.10.19 08:09:17 - OpenVPN > Opened utun device utun0
. 2019.10.19 08:09:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2019.10.19 08:09:18 - OpenVPN > /sbin/ifconfig utun0 delete
. 2019.10.19 08:09:18 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2019.10.19 08:09:18 - OpenVPN > /sbin/ifconfig utun0 10.32.196.187 10.32.196.187 netmask 255.255.255.0 mtu 1500 up
. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 10.32.196.0 10.32.196.187 255.255.255.0
. 2019.10.19 08:09:18 - OpenVPN > add net 10.32.196.0: gateway 10.32.196.187
. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 134.19.179.242 192.168.1.1 255.255.255.255
. 2019.10.19 08:09:18 - OpenVPN > add net 134.19.179.242: gateway 192.168.1.1
. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 0.0.0.0 10.32.196.1 128.0.0.0
. 2019.10.19 08:09:18 - OpenVPN > add net 0.0.0.0: gateway 10.32.196.1
. 2019.10.19 08:09:18 - OpenVPN > /sbin/route add -net 128.0.0.0 10.32.196.1 128.0.0.0
. 2019.10.19 08:09:18 - OpenVPN > add net 128.0.0.0: gateway 10.32.196.1
. 2019.10.19 08:09:18 - Starting Management Interface
. 2019.10.19 08:09:18 - OpenVPN > Initialization Sequence Completed
I 2019.10.19 08:09:19 - DNS of a network adapter forced (Bluetooth DUN)
I 2019.10.19 08:09:19 - DNS of a network adapter forced (Ethernet)
I 2019.10.19 08:09:19 - DNS of a network adapter forced (Wi-Fi)
I 2019.10.19 08:09:19 - DNS of a network adapter forced (Bluetooth PAN)
I 2019.10.19 08:09:19 - DNS of a network adapter forced (Thunderbolt Bridge)
I 2019.10.19 08:09:19 - Flushing DNS
I 2019.10.19 08:09:19 - Checking route
W 2019.10.19 08:10:09 - The request timed out
! 2019.10.19 08:10:09 - Disconnecting
. 2019.10.19 08:10:09 - Management - Send 'signal SIGTERM'
. 2019.10.19 08:10:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2019.10.19 08:10:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.10.19 08:10:09 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.10.19 08:10:14 - OpenVPN > /sbin/route delete -net 134.19.179.242 192.168.1.1 255.255.255.255
. 2019.10.19 08:10:14 - OpenVPN > delete net 134.19.179.242: gateway 192.168.1.1
. 2019.10.19 08:10:14 - Connection terminated.
I 2019.10.19 08:10:14 - DNS of a network adapter restored to original settings (Bluetooth DUN)
. 2019.10.19 08:10:14 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.32.196.1 128.0.0.0
. 2019.10.19 08:10:14 - OpenVPN > delete net 0.0.0.0: gateway 10.32.196.1
I 2019.10.19 08:10:14 - DNS of a network adapter restored to original settings (Ethernet)
. 2019.10.19 08:10:14 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.32.196.1 128.0.0.0
I 2019.10.19 08:10:14 - DNS of a network adapter restored to original settings (Wi-Fi)
. 2019.10.19 08:10:15 - OpenVPN > delete net 128.0.0.0: gateway 10.32.196.1
I 2019.10.19 08:10:15 - DNS of a network adapter restored to original settings (Bluetooth PAN)
. 2019.10.19 08:10:15 - OpenVPN > Closing TUN/TAP interface
I 2019.10.19 08:10:15 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)
. 2019.10.19 08:10:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
I 2019.10.19 08:10:15 - Cancel requested.
I 2019.10.19 08:10:15 - IPv6 restored on network adapter (Bluetooth DUN)
I 2019.10.19 08:10:15 - IPv6 restored on network adapter (Ethernet)
I 2019.10.19 08:10:15 - IPv6 restored on network adapter (Wi-Fi)
I 2019.10.19 08:10:16 - IPv6 restored on network adapter (Bluetooth PAN)
I 2019.10.19 08:10:16 - IPv6 restored on network adapter (Thunderbolt Bridge)
! 2019.10.19 08:10:16 - Session terminated.
 

Share this post


Link to post

@ Flx 

I was able to connect using tunnelblick and creating an AirVPN configuration file. Would that confirm your thought on port forward issue?

 

Share this post


Link to post
2 minutes ago, dumbo9696 said:

I was able to connect using tunnelblick and creating an AirVPN configuration file. Would that confirm your thought on port forward issue?

Great.
Do/Can you see the Connected Server/Session in Profile/Overview?

Share this post


Link to post

As said before Im a newbie..sorry. At the minute I have a client and a tunnelblick open.. The client doesn't connected and I sent the log. Do you want the log from the tunnickblick?

Share this post


Link to post
14 minutes ago, Flx said:
Great.
Do/Can you see the Connected Server/Session in Profile/Overview?
 i can see same server in the client and when i try to connect it fails using client ,but works using tunnelblick.. 

Share this post


Link to post

FLX .. It is fixed now I just reinstalled the eddie client  and it works 100% .. (Schoolboy error) . I had the older version. It must of stop working..
Thanks for making the time and helping me.. !!!

Share this post


Link to post
3 minutes ago, dumbo9696 said:

FLX .. It is fixed now I just reinstalled the eddie client  and it works 100% .. (Schoolboy error) . I had the older version. It must of stop working..
Thanks for making the time and helping me.. !!!

Is port forwarding working as well?

Share this post


Link to post

not sure- where do i check that?

see log I 2019.10.19 10:50:08 - Session starting.
I 2019.10.19 10:50:08 - Checking authorization ...
! 2019.10.19 10:50:09 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2019.10.19 10:50:09 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018
. 2019.10.19 10:50:09 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.10.19 10:50:09 - Connection to OpenVPN Management Interface
. 2019.10.19 10:50:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.10.19 10:50:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.19 10:50:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.19 10:50:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.19 10:50:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.19 10:50:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.183:443
. 2019.10.19 10:50:09 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2019.10.19 10:50:09 - OpenVPN > UDP link local: (not bound)
. 2019.10.19 10:50:09 - OpenVPN > UDP link remote: [AF_INET]213.152.161.183:443
. 2019.10.19 10:50:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.10.19 10:50:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.183:443, sid=9912d22d 5e2ff042
. 2019.10.19 10:50:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.10.19 10:50:09 - OpenVPN > VERIFY KU OK
. 2019.10.19 10:50:09 - OpenVPN > Validating certificate extended key usage
. 2019.10.19 10:50:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.10.19 10:50:09 - OpenVPN > VERIFY EKU OK
. 2019.10.19 10:50:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2019.10.19 10:50:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.10.19 10:50:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.183:443
. 2019.10.19 10:50:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2019.10.19 10:50:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.134.1,dhcp-option DNS6 fde6:7a:7d20:186::1,tun-ipv6,route-gateway 10.5.134.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:186::108e/64 fde6:7a:7d20:186::1,ifconfig 10.5.134.144 255.255.255.0,peer-id 8,cipher AES-256-GCM'
. 2019.10.19 10:50:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.10.19 10:50:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.10.19 10:50:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.10.19 10:50:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.19 10:50:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.19 10:50:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=en0 HWADDR=ac:87:a3:07:c6:68
. 2019.10.19 10:50:11 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.10.19 10:50:11 - OpenVPN > GDG6: problem writing to routing socket
. 2019.10.19 10:50:11 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2019.10.19 10:50:11 - OpenVPN > Opened utun device utun0
. 2019.10.19 10:50:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.10.19 10:50:11 - OpenVPN > /sbin/ifconfig utun0 delete
. 2019.10.19 10:50:11 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2019.10.19 10:50:11 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2019.10.19 10:50:11 - OpenVPN > /sbin/ifconfig utun0 10.5.134.144 10.5.134.144 netmask 255.255.255.0 mtu 1500 up
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 10.5.134.0 10.5.134.144 255.255.255.0
. 2019.10.19 10:50:11 - OpenVPN > add net 10.5.134.0: gateway 10.5.134.144
. 2019.10.19 10:50:11 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:186::108e/64
. 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(fde6:7a:7d20:186::/64 -> fde6:7a:7d20:186::108e metric 0) dev utun0
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:186:: -prefixlen 64 -iface utun0
. 2019.10.19 10:50:11 - OpenVPN > add net fde6:7a:7d20:186::: gateway utun0: File exists
. 2019.10.19 10:50:11 - OpenVPN > route: writing to routing socket: File exists
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 213.152.161.183 192.168.1.1 255.255.255.255
. 2019.10.19 10:50:11 - OpenVPN > add net 213.152.161.183: gateway 192.168.1.1
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 0.0.0.0 10.5.134.1 128.0.0.0
. 2019.10.19 10:50:11 - OpenVPN > add net 0.0.0.0: gateway 10.5.134.1
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -net 128.0.0.0 10.5.134.1 128.0.0.0
. 2019.10.19 10:50:11 - OpenVPN > add net 128.0.0.0: gateway 10.5.134.1
. 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:186::1 metric -1) dev utun0
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0
. 2019.10.19 10:50:11 - OpenVPN > add net ::: gateway utun0
. 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:186::1 metric -1) dev utun0
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0
. 2019.10.19 10:50:11 - OpenVPN > add net 2000::: gateway utun0
. 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:186::1 metric -1) dev utun0
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0
. 2019.10.19 10:50:11 - OpenVPN > add net 3000::: gateway utun0
. 2019.10.19 10:50:11 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:186::1 metric -1) dev utun0
. 2019.10.19 10:50:11 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0
. 2019.10.19 10:50:11 - OpenVPN > add net fc00::: gateway utun0
. 2019.10.19 10:50:11 - DNS of a network adapter forced (Bluetooth DUN, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1)
. 2019.10.19 10:50:11 - DNS of a network adapter forced (Ethernet, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1)
. 2019.10.19 10:50:12 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1)
. 2019.10.19 10:50:12 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1)
. 2019.10.19 10:50:12 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.5.134.1, fde6:7a:7d20:186::1)
. 2019.10.19 10:50:12 - Routes, added a new route, 213.152.161.181 for gateway 10.5.134.1
. 2019.10.19 10:50:12 - Routes, added a new route, 2a00:1678:2470:19:9016:df76:43b5:703e for gateway fde6:7a:7d20:186::1
. 2019.10.19 10:50:12 - Flushing DNS
I 2019.10.19 10:50:12 - Checking route IPv4
I 2019.10.19 10:50:12 - Checking route IPv6
I 2019.10.19 10:50:13 - Checking DNS
! 2019.10.19 10:50:13 - Connected.
. 2019.10.19 10:50:14 - OpenVPN > Initialization Sequence Completed
! 2019.10.19 10:50:18 - Disconnecting
. 2019.10.19 10:50:19 - Routes, removed a route previously added, 213.152.161.181 for gateway 10.5.134.1
. 2019.10.19 10:50:19 - Routes, removed a route previously added, 2a00:1678:2470:19:9016:df76:43b5:703e for gateway fde6:7a:7d20:186::1
. 2019.10.19 10:50:19 - Sending management termination signal
. 2019.10.19 10:50:19 - Management - Send 'signal SIGTERM'
. 2019.10.19 10:50:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.10.19 10:50:19 - OpenVPN > SIGTERM received, sending exit notification to peer
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...