Jump to content
Not connected, Your IP: 3.235.239.156
gmini

Eddie constantly disconnects at random and cannot connect back, mainly when using qBittorrent

Recommended Posts

Hi, i have a very weird problem and i will try to provide all the details i have so it's a bit long.
I got a new laptop, the lenovo legion y545 (windows 10 x64, network adapter is Intel(R) Wireless-AC 9560 160MHz). Installed Eddie, internet works for a while, then disconnects and shows "no internet, secured". Happened like 3 times already. Nothing I do connects back besides restarting the computer. Happened the second time after updating the wireless drivers and disabling "allow computer to turn off adapter to save power", so that's not where the problem is. Meanwhile, the internet works just fine on my iOS devices and router works normally (comcast xfinity), so that's not where the problem is either. Next i troubleshoot the connection in windows and the only message it shows is "windows security or firewall settings might be blocking the connection". I continue to 'detections details' and under 'settings that might be blocking the connection' it shows a single result: " Filter name: Eddie-ed8efc06d5263733167fbbed49230843397c3701 " and so it leads me to believe it has to do with the vpn.  Turning off and exiting Eddie does nothing, even turning off all firewalls in windows defender does nothing, again only a restart works. Now the weird part of this comes when i turn on my old laptop (some lenovo ideapad), that never had this entire issue before and suddenly the internet doesn't work in an identical way, showing "no internet, secured". I go to troubleshoot on the old laptop and it shows the same exact thing as i mentioned before with the filter "Eddie-ed8efc06d5263733167fbbed49230843397c3701" !!! WTF is going on here??? Again, the old laptop NEVER even had this problem before getting the new laptop and getting the problem on that laptop. And then as though some magic or some contagious disease, it passes onto the old laptop. I then proceed to delete eddie from the old computer to see if this goes away, but troubleshooting still detects this eddie filter that "might be blocking the connection". After restarting the old laptop internet comes back. 

UPDATE: So i'm guessing this detected filter is simply part of the network lock (not sure though), which kicks in when the issue happens and eddie disconnects. Anyways i don't know if this file that is detected is the problem itself or just a byproduct of the lock which activates during the disconnections. What's certain is that on my old laptop i never had this issue at all, and on both old and new laptop i only have windows defender and built in firewall. No 3rd party antivirus or firewall. And regarding the breakage of internet it might have been a coincidence but still not sure about that if anyone has info.
Again, the issue is that eddie constantly disconnects and cannot connect back and stays in a loop (as shown in the logs). I noticed that this problem occurs mainly when i am using qBittorrent. It seems to happen at random times- sometimes it will occur after 4-5 hours of eddie normally working, sometimes an hour, sometimes half an hour. But they are constant. I have tried both the latest beta version and the regular latest version. I have tried all kinds of protocols on eddie. I tried playing with settings on qbittorent. Nothing. 

I don't know what to do...
 

Share this post


Link to post

One thing what we need from you is the Eddie log file. Get Eddie back on, then start the connection. After that, click "Logs" on the sidebar then copy and paste the log here or use "save to file" then attach it to your post. It will help us to see what is happening.

What I see based on your post it look like Eddie unexpectedly crash or your computer restarted/shutdown while Eddie with Network Lock active. This is by design in case when those situation occurs. This is why AirVPN's Network Lock is superior than other VPN providers' Kill Switch. Go back on Eddie, then deactivate Network Lock (or enable the Network Lock then turn off the Network Lock). Always, I mean ALWAYS exit Eddie properly when you want to turn off Eddie or restart/shutdown your computer.

Share this post


Link to post
2 hours ago, NoiselessOwl said:

One thing what we need from you is the Eddie log file. Get Eddie back on, then start the connection. After that, click "Logs" on the sidebar then copy and paste the log here or use "save to file" then attach it to your post. It will help us to see what is happening.

What I see based on your post it look like Eddie unexpectedly crash or your computer restarted/shutdown while Eddie with Network Lock active. This is by design in case when those situation occurs. This is why AirVPN's Network Lock is superior than other VPN providers' Kill Switch. Go back on Eddie, then deactivate Network Lock (or enable the Network Lock then turn off the Network Lock). Always, I mean ALWAYS exit Eddie properly when you want to turn off Eddie or restart/shutdown your computer.


Thank you for the response and I will try to save the log now. But guys of course I know what the network lock is i've been using the vpn for a while. I'm pretty sure this is not the reason because I completely exit eddie when this problem occurs but the problem persists. I close it through Task manager>processes>end task because when this happens clicking x on eddie does nothing, like it's stuck. Is that the correct way to exit when eddie is stuck and won't budge? There's no remains of eddie in the processes when i end task. But again, like i mentioned the weird part is why would this issue suddenly move to other computers in the houselhold? Can someone explain?
Also please explain what the file  Eddie-ed8efc06d5263733167fbbed49230843397c3701  means?

Share this post


Link to post
Posted ... (edited)

Ok i have the logs.it keeps happening again and again after maybe an hour of everything being fine. on the ui it shows a loop of disconnecting>connecting to new server every time>authroization failed>disconnecting and again. Pressing cancel or x to exit for eddie does nothing, it is stuck in its loop. EVEN after I restarted now the internet was still not working for few minutes showing "no internet, secured" and detecting Eddie-ed8efc06d5263733167fbbed49230843397c3701 in troubleshoot. I immediately turn on my old laptop and this time the internet is working on that one so i dont know how to explain what happened before. Is Eddie-ed8efc06d5263733167fbbed49230843397c3701 part of the network lock mechanism that stays even after restarting and eddie client not even on? Also will i get faster help if i submit a ticket or something? it is very slow here and i need to fix my system.....
Edit: This issues seems to be breaking my entire ISP connection a little bit after appearing. Comcast modem stops working properly and i don't have internet in the entire house for some time.

Logs:
 

. 2019.12.17 12:09:50 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.18362.0, Mono/.Net: v4.0.30319
. 2019.12.17 12:09:50 - Reading options from C:\Program Files\AirVPN\default.xml
. 2019.12.17 12:09:51 - Command line arguments (0):
. 2019.12.17 12:09:51 - Profile path: C:\Program Files\AirVPN\default.xml
. 2019.12.17 12:09:54 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2019.12.17 12:09:54 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2019.12.17 12:09:54 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2019.12.17 12:09:54 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2019.12.17 12:09:54 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2019.12.17 12:09:54 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
W 2019.12.17 12:09:54 - Recovery. Unexpected crash?
. 2019.12.17 12:09:54 - Routes, remove 184.75.221.195 for gateway 10.31.125.1 failed: The route deletion failed: Element not found
. 2019.12.17 12:09:54 - Routes, remove 184.75.221.44 for gateway 10.0.0.1 failed: The route deletion failed: Element not found
. 2019.12.17 12:09:54 - Routes, remove 184.75.221.43 for gateway 10.30.221.1 failed: The route deletion failed: Element not found
. 2019.12.17 12:09:54 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2019.12.17 12:09:55 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
! 2019.12.17 12:09:55 - Deactivation of Network Lock
! 2019.12.17 12:09:55 - Activation of Network Lock - Windows Filtering Platform
. 2019.12.17 12:09:55 - Updating systems & servers data ...
I 2019.12.17 12:09:55 - Session starting.
. 2019.12.17 12:09:56 - Systems & servers data update completed
I 2019.12.17 12:09:59 - Checking authorization ...
! 2019.12.17 12:10:00 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2019.12.17 12:10:00 - Routes, added a new route, 184.75.221.204 for gateway 10.0.0.1
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Reading configuration from file C:\Program Files\AirVPN\d5f3ebd89ca7d08d2f6e311aff767b479dd55eb0b292fa8e6ea3d7fe07c71f3e.tmp.ssl
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: UTF-8 byte order mark detected
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[ui]: Initializing service [openvpn]
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Configuration successful
. 2019.12.17 12:10:00 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 12:10:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 12:10:00 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 12:10:00 - Connection to OpenVPN Management Interface
. 2019.12.17 12:10:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 12:10:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.12.17 12:10:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.12.17 12:10:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 12:10:00 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:12212 [nonblock]
. 2019.12.17 12:10:00 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:00 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2019.12.17 12:10:00 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49935
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: s_connect: connecting 184.75.221.204:443
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[0]: s_connect: connected 184.75.221.204:443
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.14:49936
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: SNI: sending servername: 184.75.221.204
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Peer certificate not required
. 2019.12.17 12:10:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Certificate verification disabled
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Client certificate not requested
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: TLS connected: new session negotiated
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2019.12.17 12:10:00 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:12212, sid=1c8d020e 9805f332
. 2019.12.17 12:10:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.17 12:10:00 - OpenVPN > VERIFY KU OK
. 2019.12.17 12:10:00 - OpenVPN > Validating certificate extended key usage
. 2019.12.17 12:10:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.17 12:10:00 - OpenVPN > VERIFY EKU OK
. 2019.12.17 12:10:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2019.12.17 12:10:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.17 12:10:01 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:02 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
. 2019.12.17 12:10:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.221.1,dhcp-option DNS6 fde6:7a:7d20:2dd::1,tun-ipv6,route-gateway 10.6.221.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2dd::1009/64 fde6:7a:7d20:2dd::1,ifconfig 10.6.221.11 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.12.17 12:10:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.12.17 12:10:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.12.17 12:10:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 12:10:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 12:10:02 - OpenVPN > interactive service msg_channel=0
. 2019.12.17 12:10:02 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=12 HWADDR=08:71:90:17:b4:0c
. 2019.12.17 12:10:02 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.12.17 12:10:02 - OpenVPN > GetBestInterfaceEx() returned if=12
. 2019.12.17 12:10:02 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::aa9f:ecff:fe08:b688
. 2019.12.17 12:10:02 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2019.12.17 12:10:02 - OpenVPN > ROUTE6_GATEWAY fe80::aa9f:ecff:fe08:b688 I=12
. 2019.12.17 12:10:02 - OpenVPN > open_tun
. 2019.12.17 12:10:02 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB}.tap
. 2019.12.17 12:10:02 - OpenVPN > TAP-Windows Driver Version 9.21
. 2019.12.17 12:10:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.221.0/10.6.221.11/255.255.255.0 [SUCCEEDED]
. 2019.12.17 12:10:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.221.11/255.255.255.0 on interface {4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB} [DHCP-serv: 10.6.221.254, lease-time: 31536000]
. 2019.12.17 12:10:02 - OpenVPN > Successful ARP Flush on interface [7] {4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB}
. 2019.12.17 12:10:02 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.12.17 12:10:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=7 fde6:7a:7d20:2dd::1009 store=active
. 2019.12.17 12:10:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:2dd::1 validate=no
. 2019.12.17 12:10:04 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2dd::/64 -> fde6:7a:7d20:2dd::1009 metric 0) dev Ethernet 2
. 2019.12.17 12:10:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2dd::/64 interface=7 fe80::8 store=active
. 2019.12.17 12:10:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2019.12.17 12:10:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.12.17 12:10:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 12:10:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.12.17 12:10:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 12:10:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.12.17 12:10:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2019.12.17 12:10:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2019.12.17 12:10:09 - DNS leak protection with packet filtering enabled.
. 2019.12.17 12:10:09 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.6.221.1)
. 2019.12.17 12:10:09 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:2dd::1)
. 2019.12.17 12:10:09 - Routes, added a new route, 184.75.221.203 for gateway 10.6.221.1
. 2019.12.17 12:10:10 - Routes, added a new route, 2606:6080:1001:16:3492:5f11:f1fb:66ae for gateway fde6:7a:7d20:2dd::1
. 2019.12.17 12:10:10 - Flushing DNS
I 2019.12.17 12:10:13 - Checking route IPv4
I 2019.12.17 12:10:13 - Checking route IPv6
I 2019.12.17 12:10:17 - Checking DNS
! 2019.12.17 12:10:17 - Connected.
. 2019.12.17 12:10:17 - OpenVPN > Initialization Sequence Completed
. 2019.12.17 12:11:00 - SSL > 2019.12.17 12:11:00 LOG6[cron]: Executing cron jobs
. 2019.12.17 12:11:00 - SSL > 2019.12.17 12:11:00 LOG6[cron]: Cron jobs completed in 0 seconds
. 2019.12.17 12:20:00 - Updating systems & servers data ...
. 2019.12.17 12:20:02 - Systems & servers data update completed
. 2019.12.17 12:30:06 - Updating systems & servers data ...
. 2019.12.17 12:30:08 - Systems & servers data update completed
. 2019.12.17 12:40:12 - Updating systems & servers data ...
. 2019.12.17 12:40:14 - Systems & servers data update completed
. 2019.12.17 12:50:18 - Updating systems & servers data ...
. 2019.12.17 12:50:19 - Systems & servers data update completed
. 2019.12.17 13:00:23 - Updating systems & servers data ...
. 2019.12.17 13:00:25 - Systems & servers data update completed
. 2019.12.17 13:10:01 - OpenVPN > TLS: soft reset sec=0 bytes=823384886/-1 pkts=706516/0
. 2019.12.17 13:10:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.17 13:10:01 - OpenVPN > VERIFY KU OK
. 2019.12.17 13:10:01 - OpenVPN > Validating certificate extended key usage
. 2019.12.17 13:10:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.17 13:10:01 - OpenVPN > VERIFY EKU OK
. 2019.12.17 13:10:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2019.12.17 13:10:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 13:10:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 13:10:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.17 13:10:29 - Updating systems & servers data ...
. 2019.12.17 13:10:31 - Systems & servers data update completed
. 2019.12.17 13:20:35 - Updating systems & servers data ...
. 2019.12.17 13:21:55 - Cannot retrieve systems & servers data. (curl: (28) Operation timed out after 20000 milliseconds with 11487 out of 138448 bytes received)
. 2019.12.17 13:31:29 - Updating systems & servers data ...
. 2019.12.17 13:31:36 - Systems & servers data update completed
. 2019.12.17 13:42:10 - Updating systems & servers data ...
. 2019.12.17 13:42:19 - Systems & servers data update completed
. 2019.12.17 13:53:00 - Updating systems & servers data ...
. 2019.12.17 13:54:21 - Cannot retrieve systems & servers data. (curl: (28) Operation timed out after 20015 milliseconds with 3357 out of 138448 bytes received)
. 2019.12.17 14:00:00 - SSL > 2019.12.17 14:00:00 LOG3[0]: SSL_write: Connection reset by peer (WSAECONNRESET) (10054)
. 2019.12.17 14:00:00 - OpenVPN > Connection reset, restarting [-1]
. 2019.12.17 14:00:00 - SSL > 2019.12.17 14:00:00 LOG5[0]: Connection reset: 1877136705 byte(s) sent to TLS, 4901004393 byte(s) sent to socket
. 2019.12.17 14:00:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2019.12.17 14:00:00 - OpenVPN > Restart pause, 5 second(s)
! 2019.12.17 14:00:00 - Disconnecting
. 2019.12.17 14:00:00 - Routes, removed a route previously added, 184.75.221.204 for gateway 10.0.0.1
. 2019.12.17 14:00:01 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.6.221.1
. 2019.12.17 14:00:01 - Routes, removed a route previously added, 2606:6080:1001:16:3492:5f11:f1fb:66ae for gateway fde6:7a:7d20:2dd::1
. 2019.12.17 14:00:01 - Sending management termination signal
. 2019.12.17 14:00:01 - Management - Send 'signal SIGTERM'
. 2019.12.17 14:00:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2019.12.17 14:00:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 14:00:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 14:00:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(::/3)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(2000::/4)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(3000::/4)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > Closing TUN/TAP interface
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2dd::/64)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2dd::/64 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:2dd::1009 store=active
. 2019.12.17 14:00:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all
. 2019.12.17 14:00:01 - OpenVPN > TAP: DHCP address released
. 2019.12.17 14:00:01 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2019.12.17 14:00:10 - Sending soft termination signal
. 2019.12.17 14:00:20 - Sending hard termination signal
. 2019.12.17 14:00:20 - Connection terminated.
. 2019.12.17 14:00:20 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2019.12.17 14:00:20 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2019.12.17 14:00:20 - DNS leak protection with packet filtering disabled.
. 2019.12.17 14:00:20 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2019.12.17 14:00:20 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2019.12.17 14:01:00 - Checking authorization ...
W 2019.12.17 14:02:20 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20000 milliseconds)
! 2019.12.17 14:02:20 - Connecting to Cephei (Canada, Toronto, Ontario)
. 2019.12.17 14:02:20 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:02:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:02:20 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:02:20 - Connection to OpenVPN Management Interface
. 2019.12.17 14:02:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:02:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:02:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:02:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:02:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:02:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443
. 2019.12.17 14:02:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:02:20 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:02:20 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443
. 2019.12.17 14:02:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 14:02:52 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2019.12.17 14:02:52 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.12.17 14:02:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2019.12.17 14:02:57 - Disconnecting
. 2019.12.17 14:02:57 - Connection terminated.
I 2019.12.17 14:03:00 - Checking authorization ...
. 2019.12.17 14:03:03 - Updating systems & servers data ...
W 2019.12.17 14:04:20 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20016 milliseconds)
! 2019.12.17 14:04:20 - Connecting to Tyl (Canada, Toronto, Ontario)
. 2019.12.17 14:04:20 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:04:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:04:20 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:04:20 - Connection to OpenVPN Management Interface
. 2019.12.17 14:04:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:04:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:04:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:04:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:04:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:04:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443
. 2019.12.17 14:04:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:04:20 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:04:20 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443
. 2019.12.17 14:04:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 14:04:23 - Cannot retrieve systems & servers data. (curl: (28) Connection timed out after 20016 milliseconds)
. 2019.12.17 14:04:53 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2019.12.17 14:04:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.12.17 14:04:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2019.12.17 14:04:58 - Disconnecting
. 2019.12.17 14:04:58 - Connection terminated.
I 2019.12.17 14:05:01 - Checking authorization ...
W 2019.12.17 14:06:21 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20016 milliseconds)
! 2019.12.17 14:06:21 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2019.12.17 14:06:22 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:06:22 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:06:22 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:06:22 - Connection to OpenVPN Management Interface
. 2019.12.17 14:06:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:06:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:06:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:06:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:06:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:06:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443
. 2019.12.17 14:06:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:06:22 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:06:22 - OpenVPN > UDP link remote: [AF_INET]184.75.221.213:443
. 2019.12.17 14:06:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 14:06:53 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2019.12.17 14:06:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.12.17 14:06:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2019.12.17 14:06:58 - Disconnecting
. 2019.12.17 14:06:58 - Connection terminated.
I 2019.12.17 14:07:01 - Checking authorization ...
W 2019.12.17 14:08:22 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20015 milliseconds)
! 2019.12.17 14:08:22 - Connecting to Gorgonea (Canada, Toronto, Ontario)
. 2019.12.17 14:08:22 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:08:22 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:08:22 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:08:22 - Connection to OpenVPN Management Interface
. 2019.12.17 14:08:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:08:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:08:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:08:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:08:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:08:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443
. 2019.12.17 14:08:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:08:22 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:08:22 - OpenVPN > UDP link remote: [AF_INET]104.254.90.253:443
. 2019.12.17 14:08:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

System Log: 

Eddie System/Environment Report - 12/17/2019 8:09 PM UTC

Eddie version: 2.16.3
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.18362.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Program Files\AirVPN\default.xml
Data path: C:\Program Files\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (0 args) 
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: No
Detected DNS: 2001:558:feed::1, 2001:558:feed::2, 75.75.75.75, 75.75.76.76
Test DNS IPv4: Failed
Test DNS IPv6: Failed
Test Ping IPv4: -1 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Error:curl: (6) Could not resolve host: ipv4.eddie.website
Test HTTP IPv6: Error:curl: (6) Could not resolve host: ipv6.eddie.website
Test HTTPS: Error:curl: (6) Could not resolve host: eddie.website
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
connect: True
netlock: True
network.entry.iplayer: ipv4-only

----------------------------
Logs:

. 2019.12.17 12:09:50 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.18362.0, Mono/.Net: v4.0.30319
. 2019.12.17 12:09:50 - Reading options from C:\Program Files\AirVPN\default.xml
. 2019.12.17 12:09:51 - Command line arguments (0):
. 2019.12.17 12:09:51 - Profile path: C:\Program Files\AirVPN\default.xml
. 2019.12.17 12:09:54 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2019.12.17 12:09:54 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2019.12.17 12:09:54 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2019.12.17 12:09:54 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2019.12.17 12:09:54 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2019.12.17 12:09:54 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
W 2019.12.17 12:09:54 - Recovery. Unexpected crash?
. 2019.12.17 12:09:54 - Routes, remove 184.75.221.195 for gateway 10.31.125.1 failed: The route deletion failed: Element not found
. 2019.12.17 12:09:54 - Routes, remove 184.75.221.44 for gateway 10.0.0.1 failed: The route deletion failed: Element not found
. 2019.12.17 12:09:54 - Routes, remove 184.75.221.43 for gateway 10.30.221.1 failed: The route deletion failed: Element not found
. 2019.12.17 12:09:54 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2019.12.17 12:09:55 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
! 2019.12.17 12:09:55 - Deactivation of Network Lock
! 2019.12.17 12:09:55 - Activation of Network Lock - Windows Filtering Platform
. 2019.12.17 12:09:55 - Updating systems & servers data ...
I 2019.12.17 12:09:55 - Session starting.
. 2019.12.17 12:09:56 - Systems & servers data update completed
I 2019.12.17 12:09:59 - Checking authorization ...
! 2019.12.17 12:10:00 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2019.12.17 12:10:00 - Routes, added a new route, 184.75.221.204 for gateway 10.0.0.1
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Reading configuration from file C:\Program Files\AirVPN\d5f3ebd89ca7d08d2f6e311aff767b479dd55eb0b292fa8e6ea3d7fe07c71f3e.tmp.ssl
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: UTF-8 byte order mark detected
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[ui]: Initializing service [openvpn]
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[ui]: Configuration successful
. 2019.12.17 12:10:00 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 12:10:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 12:10:00 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 12:10:00 - Connection to OpenVPN Management Interface
. 2019.12.17 12:10:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 12:10:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.12.17 12:10:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.12.17 12:10:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 12:10:00 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:12212 [nonblock]
. 2019.12.17 12:10:00 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:00 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2019.12.17 12:10:00 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49935
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: s_connect: connecting 184.75.221.204:443
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[0]: s_connect: connected 184.75.221.204:443
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.14:49936
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: SNI: sending servername: 184.75.221.204
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Peer certificate not required
. 2019.12.17 12:10:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Certificate verification disabled
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Client certificate not requested
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: TLS connected: new session negotiated
. 2019.12.17 12:10:00 - SSL > 2019.12.17 12:10:00 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2019.12.17 12:10:00 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:12212, sid=1c8d020e 9805f332
. 2019.12.17 12:10:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.17 12:10:00 - OpenVPN > VERIFY KU OK
. 2019.12.17 12:10:00 - OpenVPN > Validating certificate extended key usage
. 2019.12.17 12:10:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.17 12:10:00 - OpenVPN > VERIFY EKU OK
. 2019.12.17 12:10:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2019.12.17 12:10:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.17 12:10:01 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]127.0.0.1:12212
. 2019.12.17 12:10:02 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
. 2019.12.17 12:10:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.221.1,dhcp-option DNS6 fde6:7a:7d20:2dd::1,tun-ipv6,route-gateway 10.6.221.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2dd::1009/64 fde6:7a:7d20:2dd::1,ifconfig 10.6.221.11 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.12.17 12:10:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2019.12.17 12:10:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.12.17 12:10:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.12.17 12:10:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 12:10:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 12:10:02 - OpenVPN > interactive service msg_channel=0
. 2019.12.17 12:10:02 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=12 HWADDR=08:71:90:17:b4:0c
. 2019.12.17 12:10:02 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.12.17 12:10:02 - OpenVPN > GetBestInterfaceEx() returned if=12
. 2019.12.17 12:10:02 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::aa9f:ecff:fe08:b688
. 2019.12.17 12:10:02 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2019.12.17 12:10:02 - OpenVPN > ROUTE6_GATEWAY fe80::aa9f:ecff:fe08:b688 I=12
. 2019.12.17 12:10:02 - OpenVPN > open_tun
. 2019.12.17 12:10:02 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB}.tap
. 2019.12.17 12:10:02 - OpenVPN > TAP-Windows Driver Version 9.21
. 2019.12.17 12:10:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.221.0/10.6.221.11/255.255.255.0 [SUCCEEDED]
. 2019.12.17 12:10:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.221.11/255.255.255.0 on interface {4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB} [DHCP-serv: 10.6.221.254, lease-time: 31536000]
. 2019.12.17 12:10:02 - OpenVPN > Successful ARP Flush on interface [7] {4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB}
. 2019.12.17 12:10:02 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.12.17 12:10:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=7 fde6:7a:7d20:2dd::1009 store=active
. 2019.12.17 12:10:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:2dd::1 validate=no
. 2019.12.17 12:10:04 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2dd::/64 -> fde6:7a:7d20:2dd::1009 metric 0) dev Ethernet 2
. 2019.12.17 12:10:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2dd::/64 interface=7 fe80::8 store=active
. 2019.12.17 12:10:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2019.12.17 12:10:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.12.17 12:10:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 12:10:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.12.17 12:10:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 12:10:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.12.17 12:10:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:2dd::1 metric -1) dev Ethernet 2
. 2019.12.17 12:10:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=7 fe80::8 store=active
. 2019.12.17 12:10:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 12:10:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2019.12.17 12:10:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2019.12.17 12:10:09 - DNS leak protection with packet filtering enabled.
. 2019.12.17 12:10:09 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.6.221.1)
. 2019.12.17 12:10:09 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:2dd::1)
. 2019.12.17 12:10:09 - Routes, added a new route, 184.75.221.203 for gateway 10.6.221.1
. 2019.12.17 12:10:10 - Routes, added a new route, 2606:6080:1001:16:3492:5f11:f1fb:66ae for gateway fde6:7a:7d20:2dd::1
. 2019.12.17 12:10:10 - Flushing DNS
I 2019.12.17 12:10:13 - Checking route IPv4
I 2019.12.17 12:10:13 - Checking route IPv6
I 2019.12.17 12:10:17 - Checking DNS
! 2019.12.17 12:10:17 - Connected.
. 2019.12.17 12:10:17 - OpenVPN > Initialization Sequence Completed
. 2019.12.17 12:11:00 - SSL > 2019.12.17 12:11:00 LOG6[cron]: Executing cron jobs
. 2019.12.17 12:11:00 - SSL > 2019.12.17 12:11:00 LOG6[cron]: Cron jobs completed in 0 seconds
. 2019.12.17 12:20:00 - Updating systems & servers data ...
. 2019.12.17 12:20:02 - Systems & servers data update completed
. 2019.12.17 12:30:06 - Updating systems & servers data ...
. 2019.12.17 12:30:08 - Systems & servers data update completed
. 2019.12.17 12:40:12 - Updating systems & servers data ...
. 2019.12.17 12:40:14 - Systems & servers data update completed
. 2019.12.17 12:50:18 - Updating systems & servers data ...
. 2019.12.17 12:50:19 - Systems & servers data update completed
. 2019.12.17 13:00:23 - Updating systems & servers data ...
. 2019.12.17 13:00:25 - Systems & servers data update completed
. 2019.12.17 13:10:01 - OpenVPN > TLS: soft reset sec=0 bytes=823384886/-1 pkts=706516/0
. 2019.12.17 13:10:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.17 13:10:01 - OpenVPN > VERIFY KU OK
. 2019.12.17 13:10:01 - OpenVPN > Validating certificate extended key usage
. 2019.12.17 13:10:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.17 13:10:01 - OpenVPN > VERIFY EKU OK
. 2019.12.17 13:10:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2019.12.17 13:10:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 13:10:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.17 13:10:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.17 13:10:29 - Updating systems & servers data ...
. 2019.12.17 13:10:31 - Systems & servers data update completed
. 2019.12.17 13:20:35 - Updating systems & servers data ...
. 2019.12.17 13:21:55 - Cannot retrieve systems & servers data. (curl: (28) Operation timed out after 20000 milliseconds with 11487 out of 138448 bytes received)
. 2019.12.17 13:31:29 - Updating systems & servers data ...
. 2019.12.17 13:31:36 - Systems & servers data update completed
. 2019.12.17 13:42:10 - Updating systems & servers data ...
. 2019.12.17 13:42:19 - Systems & servers data update completed
. 2019.12.17 13:53:00 - Updating systems & servers data ...
. 2019.12.17 13:54:21 - Cannot retrieve systems & servers data. (curl: (28) Operation timed out after 20015 milliseconds with 3357 out of 138448 bytes received)
. 2019.12.17 14:00:00 - SSL > 2019.12.17 14:00:00 LOG3[0]: SSL_write: Connection reset by peer (WSAECONNRESET) (10054)
. 2019.12.17 14:00:00 - OpenVPN > Connection reset, restarting [-1]
. 2019.12.17 14:00:00 - SSL > 2019.12.17 14:00:00 LOG5[0]: Connection reset: 1877136705 byte(s) sent to TLS, 4901004393 byte(s) sent to socket
. 2019.12.17 14:00:00 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2019.12.17 14:00:00 - OpenVPN > Restart pause, 5 second(s)
! 2019.12.17 14:00:00 - Disconnecting
. 2019.12.17 14:00:00 - Routes, removed a route previously added, 184.75.221.204 for gateway 10.0.0.1
. 2019.12.17 14:00:01 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.6.221.1
. 2019.12.17 14:00:01 - Routes, removed a route previously added, 2606:6080:1001:16:3492:5f11:f1fb:66ae for gateway fde6:7a:7d20:2dd::1
. 2019.12.17 14:00:01 - Sending management termination signal
. 2019.12.17 14:00:01 - Management - Send 'signal SIGTERM'
. 2019.12.17 14:00:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 10.0.0.1
. 2019.12.17 14:00:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 14:00:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.221.1
. 2019.12.17 14:00:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(::/3)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(2000::/4)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(3000::/4)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.17 14:00:01 - OpenVPN > Closing TUN/TAP interface
. 2019.12.17 14:00:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2dd::/64)
. 2019.12.17 14:00:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2dd::/64 interface=7 fe80::8 store=active
. 2019.12.17 14:00:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:2dd::1009 store=active
. 2019.12.17 14:00:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all
. 2019.12.17 14:00:01 - OpenVPN > TAP: DHCP address released
. 2019.12.17 14:00:01 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2019.12.17 14:00:10 - Sending soft termination signal
. 2019.12.17 14:00:20 - Sending hard termination signal
. 2019.12.17 14:00:20 - Connection terminated.
. 2019.12.17 14:00:20 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2019.12.17 14:00:20 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2019.12.17 14:00:20 - DNS leak protection with packet filtering disabled.
. 2019.12.17 14:00:20 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2019.12.17 14:00:20 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2019.12.17 14:01:00 - Checking authorization ...
W 2019.12.17 14:02:20 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20000 milliseconds)
! 2019.12.17 14:02:20 - Connecting to Cephei (Canada, Toronto, Ontario)
. 2019.12.17 14:02:20 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:02:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:02:20 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:02:20 - Connection to OpenVPN Management Interface
. 2019.12.17 14:02:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:02:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:02:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:02:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:02:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:02:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443
. 2019.12.17 14:02:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:02:20 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:02:20 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443
. 2019.12.17 14:02:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 14:02:52 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2019.12.17 14:02:52 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.12.17 14:02:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2019.12.17 14:02:57 - Disconnecting
. 2019.12.17 14:02:57 - Connection terminated.
I 2019.12.17 14:03:00 - Checking authorization ...
. 2019.12.17 14:03:03 - Updating systems & servers data ...
W 2019.12.17 14:04:20 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20016 milliseconds)
! 2019.12.17 14:04:20 - Connecting to Tyl (Canada, Toronto, Ontario)
. 2019.12.17 14:04:20 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:04:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:04:20 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:04:20 - Connection to OpenVPN Management Interface
. 2019.12.17 14:04:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:04:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:04:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:04:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:04:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:04:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443
. 2019.12.17 14:04:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:04:20 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:04:20 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443
. 2019.12.17 14:04:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 14:04:23 - Cannot retrieve systems & servers data. (curl: (28) Connection timed out after 20016 milliseconds)
. 2019.12.17 14:04:53 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2019.12.17 14:04:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.12.17 14:04:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2019.12.17 14:04:58 - Disconnecting
. 2019.12.17 14:04:58 - Connection terminated.
I 2019.12.17 14:05:01 - Checking authorization ...
W 2019.12.17 14:06:21 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20016 milliseconds)
! 2019.12.17 14:06:21 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2019.12.17 14:06:22 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:06:22 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:06:22 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:06:22 - Connection to OpenVPN Management Interface
. 2019.12.17 14:06:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:06:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:06:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:06:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:06:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:06:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443
. 2019.12.17 14:06:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:06:22 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:06:22 - OpenVPN > UDP link remote: [AF_INET]184.75.221.213:443
. 2019.12.17 14:06:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 14:06:53 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2019.12.17 14:06:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.12.17 14:06:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2019.12.17 14:06:58 - Disconnecting
. 2019.12.17 14:06:58 - Connection terminated.
I 2019.12.17 14:07:01 - Checking authorization ...
W 2019.12.17 14:08:22 - Authorization check failed, continue anyway (curl: (28) Connection timed out after 20015 milliseconds)
! 2019.12.17 14:08:22 - Connecting to Gorgonea (Canada, Toronto, Ontario)
. 2019.12.17 14:08:22 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.12.17 14:08:22 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.17 14:08:22 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.12.17 14:08:22 - Connection to OpenVPN Management Interface
. 2019.12.17 14:08:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.17 14:08:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:08:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:08:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.17 14:08:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.17 14:08:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443
. 2019.12.17 14:08:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.17 14:08:22 - OpenVPN > UDP link local: (not bound)
. 2019.12.17 14:08:22 - OpenVPN > UDP link remote: [AF_INET]104.254.90.253:443
. 2019.12.17 14:08:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.17 14:08:54 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2019.12.17 14:08:54 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.12.17 14:08:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2019.12.17 14:08:59 - Disconnecting
. 2019.12.17 14:08:59 - Connection terminated.
I 2019.12.17 14:09:02 - Checking authorization ...

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "10.0.0.1",
            "metric": "35"
        },
        {
            "address": "10.0.0.0\/24",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "10.0.0.14",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "10.0.0.255",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "127.0.0.0\/8",
            "interface": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.0.0.1",
            "interface": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.255.255.255",
            "interface": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "255.255.255.255",
            "interface": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "255.255.255.255",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "::1",
            "interface": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "2601:243:2080:bb60::\/64",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "2601:243:2080:bb60::1dce",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "2601:243:2080:bb60:2493:b510:b134:6d74",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "2601:243:2080:bb60:bdac:6598:98f:c38c",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "fe80::\/64",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "fe80::2493:b510:b134:6d74",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "ff00::\/8",
            "interface": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "ff00::\/8",
            "interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "gateway": "link",
            "metric": "291"
        }
    ],
    "interfaces": [
        {
            "friendly": "Ethernet",
            "id": "{6D330DE3-4A4F-4CEB-9028-7F666A7B278F}",
            "name": "Ethernet",
            "description": "Realtek PCIe GbE Family Controller",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::6d0d:4f77:37d2:ee3a",
                "169.254.238.58"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection* 1",
            "id": "{AC267F9D-512E-4C79-909F-04C61011EFD4}",
            "name": "Local Area Connection* 1",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::e567:6c48:6271:4eae",
                "169.254.78.174"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection* 2",
            "id": "{D643ADC2-D026-4AEF-8BE5-BD52EEAC53BD}",
            "name": "Local Area Connection* 2",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter #2",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::bd7c:75b2:9613:7807",
                "169.254.120.7"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet 2",
            "id": "{4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB}",
            "name": "Ethernet 2",
            "description": "TAP-Windows Adapter V9",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "4847339051",
            "bytes_sent": "1827030529",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::1d2e:a94f:ac14:e2a5",
                "169.254.226.165"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Wi-Fi",
            "id": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}",
            "name": "Wi-Fi",
            "description": "Intel(R) Wireless-AC 9560 160MHz",
            "type": "Wireless80211",
            "status": "Up",
            "bytes_received": "5052331854",
            "bytes_sent": "1966556392",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "2601:243:2080:bb60::1dce",
                "2601:243:2080:bb60:2493:b510:b134:6d74",
                "2601:243:2080:bb60:bdac:6598:98f:c38c",
                "fe80::2493:b510:b134:6d74",
                "10.0.0.14"
            ],
            "gateways": [
                "10.0.0.1"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Bluetooth Network Connection",
            "id": "{A101785C-D0E4-487F-B10F-CEE70E0BCF60}",
            "name": "Bluetooth Network Connection",
            "description": "Bluetooth Device (Personal Area Network)",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::252a:aed6:c9c7:dd77",
                "169.254.221.119"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{46017DDF-1B2A-11EA-99E7-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "10.0.0.1",
    "ipv4-default-interface": "{A67A240E-DF52-48B1-999A-9B12DD8B2E0C}"
}
----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : LAPTOP-EBB3Q7DE
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : hsd1.il.comcast.net

Ethernet adapter Ethernet:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller
   Physical Address. . . . . . . . . : 98-FA-9B-D0-39-C1
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 1:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 08-71-90-17-B4-0D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
   Physical Address. . . . . . . . . : 0A-71-90-17-B4-0C
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-4E-1F-11-D3
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix  . : hsd1.il.comcast.net
   Description . . . . . . . . . . . : Intel(R) Wireless-AC 9560 160MHz
   Physical Address. . . . . . . . . : 08-71-90-17-B4-0C
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2601:243:2080:bb60::1dce(Preferred) 
   Lease Obtained. . . . . . . . . . : Tuesday, December 17, 2019 11:55:43 AM
   Lease Expires . . . . . . . . . . : Tuesday, December 24, 2019 11:55:44 AM
   IPv6 Address. . . . . . . . . . . : 2601:243:2080:bb60:2493:b510:b134:6d74(Preferred) 
   Temporary IPv6 Address. . . . . . : 2601:243:2080:bb60:bdac:6598:98f:c38c(Preferred) 
   Link-local IPv6 Address . . . . . : fe80::2493:b510:b134:6d74%12(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.0.0.14(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Tuesday, December 17, 2019 11:55:42 AM
   Lease Expires . . . . . . . . . . : Tuesday, December 24, 2019 11:55:43 AM
   Default Gateway . . . . . . . . . : 10.0.0.1
   DHCP Server . . . . . . . . . . . : 10.0.0.1
   DHCPv6 IAID . . . . . . . . . . . : 117993872
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-25-81-15-EB-98-FA-9B-D0-39-C1
   DNS Servers . . . . . . . . . . . : 2001:558:feed::1
                                       2001:558:feed::2
                                       75.75.75.75
                                       75.75.76.76
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 08-71-90-17-B4-10
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Edited ... by giganerd
LOG formatting

Share this post


Link to post

I had those "Inactivity Timeouts" quite a few times with OpenVPN.

I had to switch off the firewall in my router to get rid of those errors. If your router has an integrated firewall, maybe you could try switching it off.

Regards

BB


AMD Ryzen 3950X @ 105W PPL

Gigabyte X570 Aorus Elite

Gainward GTX 970

Corsair DDR4-3200 32GB

 

Share this post


Link to post
1 hour ago, BlueBanana said:

I had those "Inactivity Timeouts" quite a few times with OpenVPN.

I had to switch off the firewall in my router to get rid of those errors. If your router has an integrated firewall, maybe you could try switching it off.

Regards

BB


I don't know if it has a firewall,i have what they call xFi Gateway (basic edition) from xfinity from couple of years ago. But once again, I want to emphasize that i never had this problem, as i mentioned in my post, on the old laptop using airvpn. Using the same internet from xfinity. So this should not be the problem. The only difference i can think about is that the old computer was slower in download speed, used utorrent with speeds never exceeding 1mbps down. On the new stronger laptop i am using qbitorrent and i get speeds up to 10-11MiB (not mbps). Could comcast be breaking my internet because i am getting fast speeds now with the new laptop and they dont like it or something (seems exaggerated)? Another difference is on the old laptop i have been using the 2.4ghz wifi band and now i started using the 5ghz wifi band on the new one because i heard it brings better speed. I think i've exhausted all the details i can give...

Share this post


Link to post
27 minutes ago, Flx said:
Update your TAP Adapters.....tap-windows-9.23.3-I601-Win10.exe.zip

 
Thank you for the response. Very strange. I just installed the latest version of eddie few days ago and it installed the tap adapter with it. Also when i go to device manager and press update it says already the latest version. But anyway is this an update from the last few days? It is supposed to fix the problem completely? How can i update the adapter myself instead of downloading this?

Share this post


Link to post
39 minutes ago, gmini said:

Also when i go to device manager and press update it says already the latest version.

Go to "Control Panel\All Control Panel Items\Network Connections".
Right click on your TAP device->Properties->Configure.
What is the TAP version you see there?
From your logs posted:
1 hour ago, gmini said:

. 2019.12.17 12:10:02 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4E1F11D3-B1BF-45F1-B6DB-9271D891F6EB}.tap
. 2019.12.17 12:10:02 - OpenVPN > TAP-Windows Driver Version 9.21

Share this post


Link to post
40 minutes ago, Flx said:
Go to "Control Panel\All Control Panel Items\Network Connections".
Right click on your TAP device->Properties->Configure.
What is the TAP version you see there?
From your logs posted:
On "Ethernet 2 Network cable unplugged TAP-Windows Adapter V9" in control panel it shows Driver Version 9.0.0.21 (a completely different version from what eddie says, again strange) Driver date: 4/21/2016. I try to update again through there and it says again "best driver is already installed" which of course seems to be false as you show there is a newer version...

Share this post


Link to post
2 minutes ago, gmini said:

On "Ethernet 2 Network cable unplugged TAP-Windows Adapter V9" in control panel it shows Driver Version 9.0.0.21 (a completely different version from what eddie says, again strange) Driver date: 4/21/2016.

That's the driver version that caused the "zillion/myriad" problems in Windows 10.
5 minutes ago, gmini said:
I try to update again through there and it says again "best driver is already installed" which of course seems to be false as you show there is a newer version...
Delete/Uninstall the one you have right now. Install the Updated version. Already sent you a PM on what to do/How-to.
Regards,
Flx

Share this post


Link to post

Updated the tap adapter. Still experiencing the same issue, frequent disconnects...

Please help

Share this post


Link to post
@gmini

Hello!

Xfinity traffic shaping techniques:
https://www.xfinity.com/support/articles/network-management-information

As you can see their sentences leave room for almost anything they decide to do. If they think that a sustained UDP flow is an UDP flood, and therefore a menace to the customer or their network, they might start blocking UDP causing VPN disconnection.

For the above problem you can consider to connect with the following mode which has been reported to be good by some Comcast residential customers:
  • port 443
  • protocol TCP
  • entry-IP address 3 (THREE)

Assuming that Xfinity is not the "culprit", the problem you experienced may be on your side. The reported behavior is compatible with uTP activation in your torrent software. uTP is a traffic shaping tool integrated in some torrent software that can cause all sorts of problems when all of your traffic is tunneled in UDP, so make sure that uTP is disabled.

Kind regards
 

Share this post


Link to post
22 hours ago, Staff said:
@gmini

Hello!

Xfinity traffic shaping techniques:
https://www.xfinity.com/support/articles/network-management-information

As you can see their sentences leave room for almost anything they decide to do. If they think that a sustained UDP flow is an UDP flood, and therefore a menace to the customer or their network, they might start blocking UDP causing VPN disconnection.

For the above problem you can consider to connect with the following mode which has been reported to be good by some Comcast residential customers:
  • port 443
  • protocol TCP
  • entry-IP address 3 (THREE)

Assuming that Xfinity is not the "culprit", the problem you experienced may be on your side. The reported behavior is compatible with uTP activation in your torrent software. uTP is a traffic shaping tool integrated in some torrent software that can cause all sorts of problems when all of your traffic is tunneled in UDP, so make sure that uTP is disabled.

Kind regards
 

Hi!
I am the one that is having a discussion with you over email about this problem if you don't know :D. 

So, of course as you remember (and to let others know), we have already tried port 443, protocol TCP, entry IP 3, but of course it did not solve the issue and the disconnects continued. Moreover I had exactly the same internet with xfinity on the old laptop and have not experienced this issue. One difference however, as mentioned in one of my comments is that i used utorrent on the old laptop and now started using qbitorrent. 

So i do not think xfinity is the culprit.  But perhaps it is qbitorrent.  So now, how exactly do i disable uTP on qBitorrent? I cannot find it in the settings.

Thank you

Share this post


Link to post
@gmini

Hello!
 
Quote

how exactly do i disable uTP on qBitorrent?

 



Is it so difficult to read the documentation of those programs that one runs?

µTP and protocols in general can be set in "Connection" > "Protocols" or "Enabled Protocol" combo box. 

Kind regards

Share this post


Link to post

Did you test out other torrent software such as Transmission or Tixati?

I remember reading last week that qBittorrent's recent update have some issues that users been reporting, it could be the update that is the problem. Did you try using a older version of qBittorrent to see if the recent update is the culprit?

Share this post


Link to post
7 hours ago, Staff said:
@gmini

Hello!
 



Is it so difficult to read the documentation of those programs that one runs?

µTP and protocols in general can be set in "Connection" > "Protocols" or "Enabled Protocol" combo box. 

Kind regards

Oh for some reason i though that "Enabled Protocol" option contained TCP and UDP, not uTP. Basically i got confused with all these three-letter terms, don't mind that. 

But back to the point, this option "Enabled Protocol" on my qBittorrent client has been set to TCP since we began discussing this issue, but the issue persisted all this time. 

So here is your answer- disabling uTP did not solve this problem at all. 

Another thing is i just now tested running eddie without any program while i slept for like 10 hours. No disconnections according to the log. As soon as i turn on qBittorrent (uTP disabled!), it disconnected and cannot connect back (stuck on very slow "latency tests" and then failure loop). But again it was not always so quick, a couple times i run qBittorrent for maybe 2-3-4 hours and then it disconnected. Weird. Very random. Help?





 

Share this post


Link to post
@gmini

Hello!

Good, so you have strong clues (or even a proof) that torrenting is the cause of the problem. Now, to discern whether the cause is torrenting in general or specifically qBittorrent, change p2p software and check.

Kind regards
 

Share this post


Link to post

Okay i will try different clients and an older version and report back.

Thanks for the suggestions

Share this post


Link to post

Fuck!!! I was already starting to think that some miracle happened and then it happened again. I reverted back to qBittorrent 3.3.16 which i read is a very good stable version, back from 4.2.1 which i had before. Disabled uTP and UPnP, connected to an airvpn port... same as always. Eddie worked normally for almost 12 hours, and then it disconnected again and would not connect back even after like 6 hours (simply never connects back). Again it showed the "Boostrap failed" message as always and stuck on latency tests. Why???? 😰
Sidenote- when i click on the button to get the system log it is stuck on "performing tests" and two blue bars. I can only get the regular log. Here is the log:

. 2019.12.30 14:25:56 - Eddie version: 2.18.5beta / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.18362.0, Mono/.Net: v4.0.30319
. 2019.12.30 14:25:56 - Command line arguments (0):
. 2019.12.30 14:25:58 - Raise system privileges
. 2019.12.30 14:26:00 - Profile path: C:\Users\GabiO\AppData\Local\Eddie\default.profile
. 2019.12.30 14:26:01 - Reading options from C:\Users\GabiO\AppData\Local\Eddie\default.profile
. 2019.12.30 14:26:01 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.24.2
. 2019.12.30 14:26:01 - OpenVPN - Version: 2.4.7 - OpenSSL 1.1.0j  20 Nov 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2019.12.30 14:26:01 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2019.12.30 14:26:01 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2019.12.30 14:26:01 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2019.12.30 14:26:01 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
I 2019.12.30 14:26:02 - Ready
. 2019.12.30 14:26:03 - Collect information about AirVPN completed
I 2019.12.30 14:26:04 - Session starting.
I 2019.12.30 14:26:16 - Checking authorization ...
! 2019.12.30 14:26:17 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2019.12.30 14:26:17 - OpenVPN > OpenVPN 2.4.7 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 25 2019
. 2019.12.30 14:26:17 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.12.30 14:26:17 - OpenVPN > library versions: OpenSSL 1.1.0j  20 Nov 2018, LZO 2.10
. 2019.12.30 14:26:17 - Connection to OpenVPN Management Interface
. 2019.12.30 14:26:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.12.30 14:26:17 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.30 14:26:17 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.30 14:26:17 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.12.30 14:26:17 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.12.30 14:26:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443
. 2019.12.30 14:26:17 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.12.30 14:26:17 - OpenVPN > UDP link local: (not bound)
. 2019.12.30 14:26:17 - OpenVPN > UDP link remote: [AF_INET]184.75.221.5:443
. 2019.12.30 14:26:17 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=943524c1 a0147344
. 2019.12.30 14:26:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.12.30 14:26:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 14:26:17 - OpenVPN > VERIFY KU OK
. 2019.12.30 14:26:17 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 14:26:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 14:26:17 - OpenVPN > VERIFY EKU OK
. 2019.12.30 14:26:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 14:26:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 14:26:17 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443
. 2019.12.30 14:26:18 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1)
. 2019.12.30 14:26:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.254.1,dhcp-option DNS6 fde6:7a:7d20:10fe::1,tun-ipv6,route-gateway 10.20.254.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fe::10b3/64 fde6:7a:7d20:10fe::1,ifconfig 10.20.254.181 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2019.12.30 14:26:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.12.30 14:26:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.12.30 14:26:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.12.30 14:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 14:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 14:26:18 - OpenVPN > interactive service msg_channel=0
. 2019.12.30 14:26:18 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=12 HWADDR=08:71:90:17:b4:0c
. 2019.12.30 14:26:18 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.12.30 14:26:18 - OpenVPN > GetBestInterfaceEx() returned if=12
. 2019.12.30 14:26:18 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::aa9f:ecff:fe08:b688
. 2019.12.30 14:26:18 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2019.12.30 14:26:18 - OpenVPN > ROUTE6_GATEWAY fe80::aa9f:ecff:fe08:b688 I=12
. 2019.12.30 14:26:18 - OpenVPN > open_tun
. 2019.12.30 14:26:18 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{5F46114B-B9CA-460E-9A10-2DC0FA419513}.tap
. 2019.12.30 14:26:18 - OpenVPN > TAP-Windows Driver Version 9.24
. 2019.12.30 14:26:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.254.0/10.20.254.181/255.255.255.0 [SUCCEEDED]
. 2019.12.30 14:26:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.254.181/255.255.255.0 on interface {5F46114B-B9CA-460E-9A10-2DC0FA419513} [DHCP-serv: 10.20.254.254, lease-time: 31536000]
. 2019.12.30 14:26:18 - OpenVPN > Successful ARP Flush on interface [3] {5F46114B-B9CA-460E-9A10-2DC0FA419513}
. 2019.12.30 14:26:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=3 fde6:7a:7d20:10fe::10b3 store=active
. 2019.12.30 14:26:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:10fe::1 validate=no
. 2019.12.30 14:26:21 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2019.12.30 14:26:21 - OpenVPN > add_route_ipv6(fde6:7a:7d20:10fe::/64 -> fde6:7a:7d20:10fe::10b3 metric 0) dev Local Area Connection
. 2019.12.30 14:26:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:10fe::/64 interface=3 fe80::8 store=active
. 2019.12.30 14:26:21 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.30 14:26:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2019.12.30 14:26:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.5 MASK 255.255.255.255 10.0.0.1
. 2019.12.30 14:26:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.12.30 14:26:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.30 14:26:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.254.1
. 2019.12.30 14:26:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2019.12.30 14:26:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.30 14:26:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.254.1
. 2019.12.30 14:26:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2019.12.30 14:26:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.12.30 14:26:26 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:10fe::1 metric -1) dev Local Area Connection
. 2019.12.30 14:26:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=3 fe80::8 store=active
. 2019.12.30 14:26:26 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.30 14:26:26 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:10fe::1 metric -1) dev Local Area Connection
. 2019.12.30 14:26:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=3 fe80::8 store=active
. 2019.12.30 14:26:26 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.30 14:26:26 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:10fe::1 metric -1) dev Local Area Connection
. 2019.12.30 14:26:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=3 fe80::8 store=active
. 2019.12.30 14:26:26 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.30 14:26:26 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:10fe::1 metric -1) dev Local Area Connection
. 2019.12.30 14:26:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=3 fe80::8 store=active
. 2019.12.30 14:26:26 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.12.30 14:26:26 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2019.12.30 14:26:26 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2019.12.30 14:26:26 - DNS leak protection with packet filtering enabled.
. 2019.12.30 14:26:26 - Routes, added a new route, 184.75.221.3 for gateway 10.20.254.1
. 2019.12.30 14:26:26 - Routes, added a new route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fe::1
. 2019.12.30 14:26:26 - Flushing DNS
I 2019.12.30 14:26:29 - Checking route IPv4
I 2019.12.30 14:26:30 - Checking route IPv6
I 2019.12.30 14:26:33 - Checking DNS
! 2019.12.30 14:26:33 - Connected.
. 2019.12.30 14:26:33 - OpenVPN > Initialization Sequence Completed
. 2019.12.30 14:56:06 - Collect information about AirVPN completed
. 2019.12.30 15:26:17 - Above log line repeated 1 times more
. 2019.12.30 15:26:17 - OpenVPN > TLS: soft reset sec=0 bytes=4736582130/-1 pkts=6068222/0
. 2019.12.30 15:26:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 15:26:17 - OpenVPN > VERIFY KU OK
. 2019.12.30 15:26:17 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 15:26:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 15:26:17 - OpenVPN > VERIFY EKU OK
. 2019.12.30 15:26:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 15:26:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 15:26:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 15:26:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 15:56:10 - Collect information about AirVPN completed
. 2019.12.30 16:26:17 - Above log line repeated 1 times more
. 2019.12.30 16:26:17 - OpenVPN > TLS: soft reset sec=0 bytes=1306844413/-1 pkts=1430526/0
. 2019.12.30 16:26:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 16:26:17 - OpenVPN > VERIFY KU OK
. 2019.12.30 16:26:17 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 16:26:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 16:26:17 - OpenVPN > VERIFY EKU OK
. 2019.12.30 16:26:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 16:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 16:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 16:26:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 16:56:13 - Collect information about AirVPN completed
. 2019.12.30 17:26:18 - Above log line repeated 1 times more
. 2019.12.30 17:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 17:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.30 17:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 17:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 17:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.30 17:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 17:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 17:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 17:26:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 17:56:17 - Collect information about AirVPN completed
. 2019.12.30 18:26:17 - Renewing TLS key
. 2019.12.30 18:26:17 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.30 18:26:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 18:26:17 - OpenVPN > VERIFY KU OK
. 2019.12.30 18:26:17 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 18:26:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 18:26:17 - OpenVPN > VERIFY EKU OK
. 2019.12.30 18:26:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 18:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 18:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 18:26:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 18:26:19 - Collect information about AirVPN completed
. 2019.12.30 19:26:17 - Above log line repeated 1 times more
. 2019.12.30 19:26:17 - Renewing TLS key
. 2019.12.30 19:26:17 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.30 19:26:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 19:26:17 - OpenVPN > VERIFY KU OK
. 2019.12.30 19:26:17 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 19:26:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 19:26:17 - OpenVPN > VERIFY EKU OK
. 2019.12.30 19:26:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 19:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 19:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 19:26:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 19:26:23 - Collect information about AirVPN completed
. 2019.12.30 20:26:17 - Above log line repeated 1 times more
. 2019.12.30 20:26:17 - Renewing TLS key
. 2019.12.30 20:26:17 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.30 20:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 20:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.30 20:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 20:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 20:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.30 20:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 20:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 20:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 20:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 20:26:28 - Collect information about AirVPN completed
. 2019.12.30 21:26:18 - Above log line repeated 1 times more
. 2019.12.30 21:26:18 - OpenVPN > TLS: soft reset sec=0 bytes=416446480/-1 pkts=348929/0
. 2019.12.30 21:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 21:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.30 21:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 21:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 21:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.30 21:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 21:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 21:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 21:26:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 21:26:32 - Collect information about AirVPN completed
. 2019.12.30 22:26:18 - Above log line repeated 1 times more
. 2019.12.30 22:26:18 - OpenVPN > TLS: soft reset sec=0 bytes=24499197/-1 pkts=30336/0
. 2019.12.30 22:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 22:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.30 22:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 22:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 22:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.30 22:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 22:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 22:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 22:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 22:26:33 - Collect information about AirVPN completed
. 2019.12.30 23:26:18 - Above log line repeated 1 times more
. 2019.12.30 23:26:18 - Renewing TLS key
. 2019.12.30 23:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.30 23:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.30 23:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.30 23:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.30 23:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.30 23:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.30 23:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.30 23:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 23:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.30 23:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.30 23:26:37 - Collect information about AirVPN completed
. 2019.12.31 00:26:18 - Above log line repeated 1 times more
. 2019.12.31 00:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 00:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 00:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 00:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 00:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 00:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 00:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 00:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 00:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 00:26:42 - Collect information about AirVPN completed
. 2019.12.31 01:21:37 - Above log line repeated 1 times more
. 2019.12.31 01:21:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #291521 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2019.12.31 01:21:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #291522 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2019.12.31 01:26:18 - Above log line repeated 163 times more
. 2019.12.31 01:26:18 - Renewing TLS key
. 2019.12.31 01:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 01:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 01:26:19 - OpenVPN > VERIFY KU OK
. 2019.12.31 01:26:19 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 01:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 01:26:19 - OpenVPN > VERIFY EKU OK
. 2019.12.31 01:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 01:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 01:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 01:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 01:26:52 - Collect information about AirVPN completed
. 2019.12.31 02:26:18 - Above log line repeated 1 times more
. 2019.12.31 02:26:18 - Renewing TLS key
. 2019.12.31 02:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 02:26:19 - OpenVPN > TLS: soft reset sec=0 bytes=9509727471/-1 pkts=11792633/0
. 2019.12.31 02:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 02:26:19 - OpenVPN > VERIFY KU OK
. 2019.12.31 02:26:19 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 02:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 02:26:19 - OpenVPN > VERIFY EKU OK
. 2019.12.31 02:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 02:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 02:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 02:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 02:26:51 - Collect information about AirVPN completed
. 2019.12.31 03:16:34 - Above log line repeated 1 times more
. 2019.12.31 03:16:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4901214 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2019.12.31 03:16:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4901215 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2019.12.31 03:26:19 - Above log line repeated 359 times more
. 2019.12.31 03:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 03:26:19 - OpenVPN > VERIFY KU OK
. 2019.12.31 03:26:19 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 03:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 03:26:19 - OpenVPN > VERIFY EKU OK
. 2019.12.31 03:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 03:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 03:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 03:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 03:26:55 - Collect information about AirVPN completed
. 2019.12.31 04:26:18 - Above log line repeated 1 times more
. 2019.12.31 04:26:18 - Renewing TLS key
. 2019.12.31 04:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 04:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 04:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 04:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 04:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 04:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 04:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 04:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 04:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 04:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 04:27:00 - Collect information about AirVPN completed
. 2019.12.31 05:26:18 - Above log line repeated 1 times more
. 2019.12.31 05:26:18 - Renewing TLS key
. 2019.12.31 05:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 05:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 05:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 05:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 05:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 05:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 05:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 05:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 05:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 05:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 05:27:06 - Collect information about AirVPN completed
. 2019.12.31 06:26:18 - Above log line repeated 1 times more
. 2019.12.31 06:26:18 - Renewing TLS key
. 2019.12.31 06:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 06:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 06:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 06:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 06:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 06:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 06:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 06:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 06:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 06:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 06:27:11 - Collect information about AirVPN completed
. 2019.12.31 07:26:18 - Above log line repeated 1 times more
. 2019.12.31 07:26:18 - Renewing TLS key
. 2019.12.31 07:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 07:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 07:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 07:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 07:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 07:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 07:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 07:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 07:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 07:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 07:27:16 - Collect information about AirVPN completed
. 2019.12.31 08:26:18 - Above log line repeated 1 times more
. 2019.12.31 08:26:18 - Renewing TLS key
. 2019.12.31 08:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 08:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 08:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 08:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 08:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 08:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 08:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 08:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 08:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 08:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 08:27:21 - Collect information about AirVPN completed
. 2019.12.31 09:26:18 - Above log line repeated 1 times more
. 2019.12.31 09:26:18 - Renewing TLS key
. 2019.12.31 09:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 09:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 09:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 09:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 09:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 09:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 09:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 09:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 09:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 09:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 09:27:27 - Collect information about AirVPN completed
. 2019.12.31 10:26:18 - Above log line repeated 1 times more
. 2019.12.31 10:26:18 - Renewing TLS key
. 2019.12.31 10:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 10:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 10:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 10:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 10:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 10:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 10:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 10:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 10:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 10:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 10:27:32 - Collect information about AirVPN completed
. 2019.12.31 11:26:18 - Above log line repeated 1 times more
. 2019.12.31 11:26:18 - Renewing TLS key
. 2019.12.31 11:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 11:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 11:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 11:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 11:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 11:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 11:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 11:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 11:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 11:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 11:27:37 - Collect information about AirVPN completed
. 2019.12.31 12:26:18 - Above log line repeated 1 times more
. 2019.12.31 12:26:18 - Renewing TLS key
. 2019.12.31 12:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 12:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 12:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 12:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 12:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 12:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 12:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 12:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 12:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 12:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 12:27:42 - Collect information about AirVPN completed
. 2019.12.31 13:26:18 - Above log line repeated 1 times more
. 2019.12.31 13:26:18 - Renewing TLS key
. 2019.12.31 13:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 13:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 13:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 13:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 13:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 13:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 13:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 13:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 13:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 13:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 13:27:48 - Collect information about AirVPN completed
. 2019.12.31 14:26:18 - Above log line repeated 1 times more
. 2019.12.31 14:26:18 - Renewing TLS key
. 2019.12.31 14:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 14:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 14:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 14:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 14:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 14:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 14:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 14:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 14:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 14:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 14:27:53 - Collect information about AirVPN completed
. 2019.12.31 15:26:18 - Above log line repeated 1 times more
. 2019.12.31 15:26:18 - Renewing TLS key
. 2019.12.31 15:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 15:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 15:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 15:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 15:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 15:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 15:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 15:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 15:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 15:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 15:27:58 - Collect information about AirVPN completed
. 2019.12.31 15:47:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #580188 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2019.12.31 15:58:00 - Above log line repeated 14 times more
. 2019.12.31 15:58:00 - Collect information about AirVPN completed
. 2019.12.31 16:26:18 - Renewing TLS key
. 2019.12.31 16:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 16:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 16:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 16:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 16:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 16:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 16:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 16:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 16:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 16:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 16:28:02 - Collect information about AirVPN completed
. 2019.12.31 17:26:18 - Above log line repeated 1 times more
. 2019.12.31 17:26:18 - Renewing TLS key
. 2019.12.31 17:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 17:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 17:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 17:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 17:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 17:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 17:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 17:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 17:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 17:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 17:28:07 - Collect information about AirVPN completed
. 2019.12.31 18:26:18 - Above log line repeated 1 times more
. 2019.12.31 18:26:18 - Renewing TLS key
. 2019.12.31 18:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 18:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 18:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 18:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 18:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 18:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 18:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 18:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 18:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 18:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 18:28:12 - Collect information about AirVPN completed
. 2019.12.31 19:26:18 - Above log line repeated 1 times more
. 2019.12.31 19:26:18 - Renewing TLS key
. 2019.12.31 19:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 19:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 19:26:19 - OpenVPN > VERIFY KU OK
. 2019.12.31 19:26:19 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 19:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 19:26:19 - OpenVPN > VERIFY EKU OK
. 2019.12.31 19:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 19:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 19:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 19:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 19:28:17 - Collect information about AirVPN completed
. 2019.12.31 20:26:18 - Above log line repeated 1 times more
. 2019.12.31 20:26:18 - Renewing TLS key
. 2019.12.31 20:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 20:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 20:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 20:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 20:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 20:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 20:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 20:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 20:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 20:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 20:28:22 - Collect information about AirVPN completed
. 2019.12.31 21:26:18 - Above log line repeated 1 times more
. 2019.12.31 21:26:18 - Renewing TLS key
. 2019.12.31 21:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 21:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 21:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 21:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 21:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 21:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 21:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 21:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 21:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 21:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 21:28:25 - Collect information about AirVPN completed
. 2019.12.31 22:26:18 - Above log line repeated 1 times more
. 2019.12.31 22:26:18 - Renewing TLS key
. 2019.12.31 22:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 22:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 22:26:18 - OpenVPN > VERIFY KU OK
. 2019.12.31 22:26:18 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 22:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 22:26:18 - OpenVPN > VERIFY EKU OK
. 2019.12.31 22:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 22:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 22:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 22:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 22:28:29 - Collect information about AirVPN completed
. 2019.12.31 23:26:18 - Above log line repeated 1 times more
. 2019.12.31 23:26:18 - Renewing TLS key
. 2019.12.31 23:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.12.31 23:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.12.31 23:26:19 - OpenVPN > VERIFY KU OK
. 2019.12.31 23:26:19 - OpenVPN > Validating certificate extended key usage
. 2019.12.31 23:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.12.31 23:26:19 - OpenVPN > VERIFY EKU OK
. 2019.12.31 23:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.12.31 23:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 23:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.12.31 23:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.12.31 23:28:33 - Collect information about AirVPN completed
. 2020.01.01 00:26:18 - Above log line repeated 1 times more
. 2020.01.01 00:26:18 - Renewing TLS key
. 2020.01.01 00:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.01.01 00:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.01 00:26:19 - OpenVPN > VERIFY KU OK
. 2020.01.01 00:26:19 - OpenVPN > Validating certificate extended key usage
. 2020.01.01 00:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.01 00:26:19 - OpenVPN > VERIFY EKU OK
. 2020.01.01 00:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2020.01.01 00:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.01 00:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.01 00:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.01 00:28:36 - Collect information about AirVPN completed
. 2020.01.01 01:10:33 - Above log line repeated 1 times more
. 2020.01.01 01:10:33 - OpenVPN > [Lesath] Inactivity timeout (--ping-restart), restarting
. 2020.01.01 01:10:33 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2020.01.01 01:10:33 - OpenVPN > Restart pause, 5 second(s)
! 2020.01.01 01:10:33 - Disconnecting
. 2020.01.01 01:10:33 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.20.254.1
. 2020.01.01 01:10:34 - Routes, removed a route previously added, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fe::1
. 2020.01.01 01:10:34 - Sending management termination signal
. 2020.01.01 01:10:34 - Management - Send 'signal SIGTERM'
. 2020.01.01 01:10:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.5 MASK 255.255.255.255 10.0.0.1
. 2020.01.01 01:10:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.254.1
. 2020.01.01 01:10:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.254.1
. 2020.01.01 01:10:34 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.01.01 01:10:34 - OpenVPN > delete_route_ipv6(::/3)
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=3 fe80::8 store=active
. 2020.01.01 01:10:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.01 01:10:34 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=3 fe80::8 store=active
. 2020.01.01 01:10:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.01 01:10:34 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=3 fe80::8 store=active
. 2020.01.01 01:10:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.01 01:10:34 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=3 fe80::8 store=active
. 2020.01.01 01:10:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.01.01 01:10:34 - OpenVPN > Closing TUN/TAP interface
. 2020.01.01 01:10:34 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:10fe::/64)
. 2020.01.01 01:10:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:10fe::/64 interface=3 fe80::8 store=active
. 2020.01.01 01:10:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Local Area Connection fde6:7a:7d20:10fe::10b3 store=active
. 2020.01.01 01:10:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Local Area Connection all
. 2020.01.01 01:10:34 - OpenVPN > TAP: DHCP address released
. 2020.01.01 01:10:34 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2020.01.01 01:10:34 - Connection terminated.
. 2020.01.01 01:10:34 - DNS leak protection with packet filtering disabled.
. 2020.01.01 01:10:34 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4
. 2020.01.01 01:10:34 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6
. 2020.01.01 01:29:59 - Cannot retrieve information about AirVPN: curl: (28) Connection timed out after 20000 milliseconds
. 2020.01.01 05:30:20 - Above log line repeated 7 times more
. 2020.01.01 05:30:20 - Cannot retrieve information about AirVPN: curl: (28) Connection timed out after 20016 milliseconds
. 2020.01.01 06:00:23 - Cannot retrieve information about AirVPN: curl: (28) Connection timed out after 20000 milliseconds

 

Share this post


Link to post

It might actually also be a bad wifi adapter because i just experienced a disconnection without the vpn on. Might have to return the laptop entirely or something...super annoying

Share this post


Link to post

Did you try using the ethernet to see (wire connect to the router) if this is the case? Also what the make and model of your wifi adpater? You can get this information from Device Manager.

Share this post


Link to post
11 hours ago, NoiselessOwl said:

Did you try using the ethernet to see (wire connect to the router) if this is the case? Also what the make and model of your wifi adpater? You can get this information from Device Manager.

I have not tried ethernet yet. Basically it would be a headache as the modem is located in a different room and can only be connected there. But i understand it can be a good test.

I have the Intel Wireless AC 9560 160MHz (mentioned before btw) on a new Lenovo Legion y545.  After my last comment i went to the intel website and downloaded the latest driver for it from december 2019, which of course it didn't find and told me i was up to date when i searched for update through device manager. The previous version was something from may-june 2019 so i don't know how much difference it would make. But I will test the connection again with this new version.

Another thing as i mentioned i started using 5 ghz wifi with this laptop compared to 2.4 ghz i was using on the old laptop. And i just researched and found that 5 ghz could also be a cause of regular disconnections specifically when you are seperated by walls, and i am indeed separated by two walls (not concrete though, light material). So i still need to test 2.4 ghz.

Although i have several other problems with this laptop so i still might need to return, like constant annoying electrical screeching sounds, especially whenever something moves on the display, louder on plugged battery, and then also frequent random 1 second freezes(noticable when scrolling). If anyone has experience with that lol i appreciate advice 🙏

And thank you NoiselessOwl for the advice.
 

Share this post


Link to post
On 12/17/2019 at 12:08 PM, gmini said:

Hi, i have a very weird problem and i will try to provide all the details i have so it's a bit long.
I got a new laptop, the lenovo legion y545 (windows 10 x64, network adapter is Intel(R) Wireless-AC 9560 160MHz). Installed Eddie, internet works for a while, then disconnects and shows "no internet, secured". Happened like 3 times already. Nothing I do connects back besides restarting the computer. Happened the second time after updating the wireless drivers and disabling "allow computer to turn off adapter to save power", so that's not where the problem is. Meanwhile, the internet works just fine on my iOS devices and router works normally (comcast xfinity), so that's not where the problem is either. Next i troubleshoot the connection in windows and the only message it shows is "windows security or firewall settings might be blocking the connection". I continue to 'detections details' and under 'settings that might be blocking the connection' it shows a single result: " Filter name: Eddie-ed8efc06d5263733167fbbed49230843397c3701 " and so it leads me to believe it has to do with the vpn.  Turning off and exiting Eddie does nothing, even turning off all firewalls in windows defender does nothing, again only a restart works. Now the weird part of this comes when i turn on my old laptop (some lenovo ideapad), that never had this entire issue before and suddenly the internet doesn't work in an identical way, showing "no internet, secured". I go to troubleshoot on the old laptop and it shows the same exact thing as i mentioned before with the filter "Eddie-ed8efc06d5263733167fbbed49230843397c3701" !!! WTF is going on here??? Again, the old laptop NEVER even had this problem before getting the new laptop and getting the problem on that laptop. And then as though some magic or some contagious disease, it passes onto the old laptop. I then proceed to delete eddie from the old computer to see if this goes away, but troubleshooting still detects this eddie filter that "might be blocking the connection". After restarting the old laptop internet comes back. 

UPDATE: So i'm guessing this detected filter is simply part of the network lock (not sure though), which kicks in when the issue happens and eddie disconnects. Anyways i don't know if this file that is detected is the problem itself or just a byproduct of the lock which activates during the disconnections. What's certain is that on my old laptop i never had this issue at all, and on both old and new laptop i only have windows defender and built in firewall. No 3rd party antivirus or firewall. And regarding the breakage of internet it might have been a coincidence but still not sure about that if anyone has info.
Again, the issue is that eddie constantly disconnects and cannot connect back and stays in a loop (as shown in the logs). I noticed that this problem occurs mainly when i am using qBittorrent. It seems to happen at random times- sometimes it will occur after 4-5 hours of eddie normally working, sometimes an hour, sometimes half an hour. But they are constant. I have tried both the latest beta version and the regular latest version. I have tried all kinds of protocols on eddie. I tried playing with settings on qbittorent. Nothing. 

I don't know what to do...
 


I don't believe it's possbile to VPN safely in Windows or macOS.

If you run netstat in a command window whilst connected to your VPN you'll notice an ESTABLISHED connection between the internal LAN IP address of your host machine and Microsoft's Telemetry Server. You should only see connections to and from the public VPN IP address.

I realise this doesn't directly address your problem but I think your effort would be better spent learning how to use Ubuntu 16.04.5.

Happy to post further instructions if this is something you're willing to consider?

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...