Jump to content
Not connected, Your IP: 18.119.142.113
Sign in to follow this  
Millennium Falcon

ANSWERED Out of nowhere, vpn won't connect!

Recommended Posts

Posted ... (edited)

AirVpn has been working flawlesly for 5+ years, and this morning it just keeps restarting, meaning it just disconnects and then tries to re-connect, but with no luck!

Help please,

:)
 

. 2024.04.08 11:36:44 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319
. 2024.04.08 11:36:44 - Command line arguments (1): path="home"
. 2024.04.08 11:36:47 - Reading options from C:\Users\kelly\AppData\Local\Eddie\default.profile
. 2024.04.08 11:36:49 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2024.04.08 11:36:49 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe)
. 2024.04.08 11:36:49 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
! 2024.04.08 11:36:50 - Activation of Network Lock - Windows Filtering Platform
I 2024.04.08 11:36:51 - Ready
. 2024.04.08 11:36:53 - Collect information about AirVPN completed
I 2024.04.08 11:36:54 - Session starting.
I 2024.04.08 11:36:54 - Checking authorization ...
. 2024.04.08 11:36:57 - Collect information about AirVPN completed
. 2024.04.08 11:36:58 - Added new network interface "Eddie", Wintun version 0.12
. 2024.04.08 11:36:58 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2024.04.08 11:36:58 - Connecting to Aquila (United States of America, Fremont, California)
. 2024.04.08 11:36:59 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:36:59 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists.
. 2024.04.08 11:36:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.04.08 11:36:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.04.08 11:36:59 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.04.08 11:36:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:36:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:36:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:36:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:36:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443
. 2024.04.08 11:36:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.04.08 11:36:59 - OpenVPN > UDP link local: (not bound)
. 2024.04.08 11:36:59 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443
. 2024.04.08 11:36:59 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=351e8aaa d1e4b326
. 2024.04.08 11:37:00 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835
. 2024.04.08 11:37:00 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
. 2024.04.08 11:37:00 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error
. 2024.04.08 11:37:00 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error
. 2024.04.08 11:37:00 - OpenVPN > TLS Error: TLS handshake failed
. 2024.04.08 11:37:00 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2024.04.08 11:37:00 - OpenVPN > Restart pause, 5 second(s)
! 2024.04.08 11:37:00 - Disconnecting
. 2024.04.08 11:37:00 - Sending soft termination signal
. 2024.04.08 11:37:04 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2024.04.08 11:37:05 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:05 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists.
. 2024.04.08 11:37:05 - Connection terminated.
I 2024.04.08 11:37:08 - Checking authorization ...
. 2024.04.08 11:37:10 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2024.04.08 11:37:10 - Connecting to Aquila (United States of America, Fremont, California)
. 2024.04.08 11:37:11 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:11 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists.
. 2024.04.08 11:37:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.04.08 11:37:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.04.08 11:37:11 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.04.08 11:37:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.04.08 11:37:11 - OpenVPN > UDP link local: (not bound)
. 2024.04.08 11:37:11 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:11 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=9ad4b178 62d34cde
. 2024.04.08 11:37:12 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835
. 2024.04.08 11:37:12 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
. 2024.04.08 11:37:12 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error
. 2024.04.08 11:37:12 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error
. 2024.04.08 11:37:12 - OpenVPN > TLS Error: TLS handshake failed
. 2024.04.08 11:37:12 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2024.04.08 11:37:12 - OpenVPN > Restart pause, 5 second(s)
! 2024.04.08 11:37:12 - Disconnecting
. 2024.04.08 11:37:12 - Sending soft termination signal
. 2024.04.08 11:37:17 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2024.04.08 11:37:17 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:17 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists.
. 2024.04.08 11:37:17 - Connection terminated.
I 2024.04.08 11:37:20 - Checking authorization ...
. 2024.04.08 11:37:22 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2024.04.08 11:37:22 - Connecting to Aquila (United States of America, Fremont, California)
. 2024.04.08 11:37:23 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:23 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists.
. 2024.04.08 11:37:23 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.04.08 11:37:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.04.08 11:37:23 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.04.08 11:37:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.04.08 11:37:23 - OpenVPN > UDP link local: (not bound)
. 2024.04.08 11:37:23 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:23 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=3a25aa8b 26506ae8
. 2024.04.08 11:37:23 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835
. 2024.04.08 11:37:23 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
. 2024.04.08 11:37:23 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error
. 2024.04.08 11:37:23 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error
. 2024.04.08 11:37:23 - OpenVPN > TLS Error: TLS handshake failed
. 2024.04.08 11:37:23 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2024.04.08 11:37:23 - OpenVPN > Restart pause, 5 second(s)
! 2024.04.08 11:37:23 - Disconnecting
. 2024.04.08 11:37:23 - Sending soft termination signal
. 2024.04.08 11:37:28 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2024.04.08 11:37:29 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:29 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists.
. 2024.04.08 11:37:29 - Connection terminated.
I 2024.04.08 11:37:32 - Checking authorization ...
. 2024.04.08 11:37:34 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2024.04.08 11:37:34 - Connecting to Aquila (United States of America, Fremont, California)
. 2024.04.08 11:37:34 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:35 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists.
. 2024.04.08 11:37:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.04.08 11:37:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.04.08 11:37:35 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.04.08 11:37:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.04.08 11:37:35 - OpenVPN > UDP link local: (not bound)
. 2024.04.08 11:37:35 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:35 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=00db1bd7 db19b8c6
. 2024.04.08 11:37:35 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835
. 2024.04.08 11:37:35 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
. 2024.04.08 11:37:35 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error
. 2024.04.08 11:37:35 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error
. 2024.04.08 11:37:35 - OpenVPN > TLS Error: TLS handshake failed
. 2024.04.08 11:37:35 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2024.04.08 11:37:35 - OpenVPN > Restart pause, 5 second(s)
! 2024.04.08 11:37:35 - Disconnecting
. 2024.04.08 11:37:35 - Sending soft termination signal
. 2024.04.08 11:37:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2024.04.08 11:37:41 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:41 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists.
. 2024.04.08 11:37:41 - Connection terminated.
I 2024.04.08 11:37:44 - Checking authorization ...
. 2024.04.08 11:37:45 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2024.04.08 11:37:45 - Connecting to Aquila (United States of America, Fremont, California)
. 2024.04.08 11:37:46 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:46 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists.
. 2024.04.08 11:37:46 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.04.08 11:37:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.04.08 11:37:46 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.04.08 11:37:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.04.08 11:37:46 - OpenVPN > UDP link local: (not bound)
. 2024.04.08 11:37:46 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:47 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=81ee2178 8a3943d9
. 2024.04.08 11:37:47 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835
. 2024.04.08 11:37:47 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
. 2024.04.08 11:37:47 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error
. 2024.04.08 11:37:47 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error
. 2024.04.08 11:37:47 - OpenVPN > TLS Error: TLS handshake failed
. 2024.04.08 11:37:47 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2024.04.08 11:37:47 - OpenVPN > Restart pause, 5 second(s)
! 2024.04.08 11:37:47 - Disconnecting
. 2024.04.08 11:37:47 - Sending soft termination signal
. 2024.04.08 11:37:52 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2024.04.08 11:37:52 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:52 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists.
. 2024.04.08 11:37:52 - Connection terminated.
I 2024.04.08 11:37:55 - Checking authorization ...
. 2024.04.08 11:37:57 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2024.04.08 11:37:57 - Connecting to Aquila (United States of America, Fremont, California)
. 2024.04.08 11:37:58 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:37:58 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists.
. 2024.04.08 11:37:58 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.04.08 11:37:58 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.04.08 11:37:58 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.04.08 11:37:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:37:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:37:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.04.08 11:37:58 - OpenVPN > UDP link local: (not bound)
. 2024.04.08 11:37:58 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443
. 2024.04.08 11:37:58 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=cc8b878f f5a55914
. 2024.04.08 11:37:58 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835
. 2024.04.08 11:37:58 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
. 2024.04.08 11:37:58 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error
. 2024.04.08 11:37:58 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error
. 2024.04.08 11:37:58 - OpenVPN > TLS Error: TLS handshake failed
. 2024.04.08 11:37:58 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2024.04.08 11:37:58 - OpenVPN > Restart pause, 5 second(s)
! 2024.04.08 11:37:58 - Disconnecting
. 2024.04.08 11:37:58 - Sending soft termination signal
. 2024.04.08 11:38:03 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2024.04.08 11:38:04 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:38:04 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists.
. 2024.04.08 11:38:04 - Connection terminated.
I 2024.04.08 11:38:07 - Checking authorization ...
. 2024.04.08 11:38:09 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2024.04.08 11:38:09 - Connecting to Aquila (United States of America, Fremont, California)
. 2024.04.08 11:38:10 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".
. 2024.04.08 11:38:10 - Routes, add 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists.
. 2024.04.08 11:38:10 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.04.08 11:38:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.04.08 11:38:10 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.04.08 11:38:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:38:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:38:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.04.08 11:38:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.04.08 11:38:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]23.130.104.132:443
. 2024.04.08 11:38:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.04.08 11:38:10 - OpenVPN > UDP link local: (not bound)
. 2024.04.08 11:38:10 - OpenVPN > UDP link remote: [AF_INET]23.130.104.132:443
. 2024.04.08 11:38:10 - OpenVPN > TLS: Initial packet from [AF_INET]23.130.104.132:443, sid=5ad1e0d4 eb5a90d8
. 2024.04.08 11:38:10 - OpenVPN > VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835
. 2024.04.08 11:38:10 - OpenVPN > OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed
. 2024.04.08 11:38:10 - OpenVPN > TLS_ERROR: BIO read tls_read_plaintext error
. 2024.04.08 11:38:10 - OpenVPN > TLS Error: TLS object -> incoming plaintext read error
. 2024.04.08 11:38:10 - OpenVPN > TLS Error: TLS handshake failed
. 2024.04.08 11:38:10 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2024.04.08 11:38:10 - OpenVPN > Restart pause, 5 second(s)
! 2024.04.08 11:38:10 - Disconnecting
. 2024.04.08 11:38:10 - Sending soft termination signal
. 2024.04.08 11:38:15 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2024.04.08 11:38:16 - Routes, delete 23.130.104.132/32 for interface "Wi-Fi (Qualcomm Atheros QCA9377 Wireless Network Adapter)".

 

Edited ... by Millennium Falcon

Share this post


Link to post
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...