I 2014.08.06 15:37:46 - Renewing TLS key . 2014.08.06 15:37:46 - OpenVPN > TLS: tls_process: killed expiring key . 2014.08.06 15:38:06 - OpenVPN > TLS: soft reset sec=0 bytes=15762199/0 pkts=34312/0 . 2014.08.06 15:38:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.06 15:38:06 - OpenVPN > Validating certificate key usage . 2014.08.06 15:38:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.06 15:38:06 - OpenVPN > VERIFY KU OK . 2014.08.06 15:38:06 - OpenVPN > Validating certificate extended key usage . 2014.08.06 15:38:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.06 15:38:06 - OpenVPN > VERIFY EKU OK . 2014.08.06 15:38:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.06 15:38:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.06 15:38:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 15:38:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.06 15:38:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 15:38:22 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.06 21:02:22 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.06 21:02:22 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.06 21:02:22 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.06 21:02:22 - Disconnecting . 2014.08.06 21:02:22 - Management - Send 'signal SIGTERM' . 2014.08.06 21:02:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.06 21:02:22 - Connection terminated. . 2014.08.06 21:02:35 - OpenVPN > MANAGEMENT: Client disconnected . 2014.08.06 21:02:35 - OpenVPN > Assertion failed at misc.c:785 . 2014.08.06 21:02:35 - OpenVPN > Exiting due to fatal error ! 2014.08.06 21:02:36 - Waiting for latency tests ! 2014.08.06 21:02:40 - Checking authorization ! 2014.08.06 21:02:56 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.06 21:02:56 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.06 21:02:56 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.06 21:02:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.06 21:02:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.06 21:02:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 21:02:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 21:02:56 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.06 21:02:56 - OpenVPN > UDPv4 link local: [undef] . 2014.08.06 21:02:56 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.06 21:03:11 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=d2e606d6 4e07801c . 2014.08.06 21:03:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.06 21:03:24 - OpenVPN > Validating certificate key usage . 2014.08.06 21:03:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.06 21:03:24 - OpenVPN > VERIFY KU OK . 2014.08.06 21:03:24 - OpenVPN > Validating certificate extended key usage . 2014.08.06 21:03:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.06 21:03:24 - OpenVPN > VERIFY EKU OK . 2014.08.06 21:03:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.06 21:03:56 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2014.08.06 21:03:56 - OpenVPN > TLS Error: TLS handshake failed . 2014.08.06 21:03:56 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2014.08.06 21:03:56 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.06 21:03:56 - Disconnecting . 2014.08.06 21:03:56 - Connection terminated. ! 2014.08.06 21:03:59 - Checking authorization ! 2014.08.06 21:04:02 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.06 21:04:02 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.06 21:04:02 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.06 21:04:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.06 21:04:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.06 21:04:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 21:04:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 21:04:02 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.06 21:04:02 - OpenVPN > UDPv4 link local: [undef] . 2014.08.06 21:04:02 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.06 21:04:05 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=4f07fd49 5a39d4de . 2014.08.06 21:04:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.06 21:04:20 - OpenVPN > Validating certificate key usage . 2014.08.06 21:04:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.06 21:04:20 - OpenVPN > VERIFY KU OK . 2014.08.06 21:04:20 - OpenVPN > Validating certificate extended key usage . 2014.08.06 21:04:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.06 21:04:20 - OpenVPN > VERIFY EKU OK . 2014.08.06 21:04:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.06 21:04:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.06 21:04:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 21:04:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.06 21:04:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.06 21:04:23 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.06 21:04:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443 . 2014.08.06 21:04:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.06 21:04:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.56.194 10.4.56.193' . 2014.08.06 21:04:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.06 21:04:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.06 21:04:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.06 21:04:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.06 21:04:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.06 21:04:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.06 21:04:28 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.06 21:04:28 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.06 21:04:28 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.06 21:04:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.194/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.56.193, lease-time: 31536000] . 2014.08.06 21:04:28 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.06 21:04:28 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2014.08.06 21:04:33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.06 21:04:33 - OpenVPN > C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.0.1 . 2014.08.06 21:04:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2014.08.06 21:04:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.06 21:04:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.06 21:04:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.06 21:04:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.06 21:04:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.06 21:04:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.06 21:04:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.06 21:04:33 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.56.193 . 2014.08.06 21:04:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.06 21:04:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.06 21:04:33 - Starting Management Interface . 2014.08.06 21:04:33 - OpenVPN > Initialization Sequence Completed ! 2014.08.06 21:04:33 - Flushing DNS ! 2014.08.06 21:04:33 - Checking route ! 2014.08.06 21:04:34 - Connected. . 2014.08.06 21:04:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.06 21:04:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info ! 2014.08.06 21:05:15 - Disconnecting . 2014.08.06 21:05:15 - Management - Send 'signal SIGTERM' . 2014.08.06 21:05:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.06 21:05:15 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.06 21:05:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.56.193 . 2014.08.06 21:05:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.06 21:05:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 149.255.33.154 MASK 255.255.255.255 192.168.0.1 . 2014.08.06 21:05:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.06 21:05:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.06 21:05:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.06 21:05:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.06 21:05:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.06 21:05:20 - OpenVPN > Closing TUN/TAP interface . 2014.08.06 21:05:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2014.08.06 21:05:20 - Connection terminated. I 2014.08.06 21:05:20 - Session terminated. I 2014.08.07 09:13:47 - Session starting. ! 2014.08.07 09:13:47 - Checking environment ! 2014.08.07 09:13:48 - Checking authorization ! 2014.08.07 09:13:49 - Connecting to Andromedae (United States, Manassas, Virginia) . 2014.08.07 09:13:50 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.07 09:13:50 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.07 09:13:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.07 09:13:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.07 09:13:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:13:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:13:50 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.07 09:13:50 - OpenVPN > UDPv4 link local: [undef] . 2014.08.07 09:13:50 - OpenVPN > UDPv4 link remote: [AF_INET]108.59.8.142:443 . 2014.08.07 09:13:50 - OpenVPN > TLS: Initial packet from [AF_INET]108.59.8.142:443, sid=d5f45134 5b048560 . 2014.08.07 09:13:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 09:13:50 - OpenVPN > Validating certificate key usage . 2014.08.07 09:13:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 09:13:50 - OpenVPN > VERIFY KU OK . 2014.08.07 09:13:50 - OpenVPN > Validating certificate extended key usage . 2014.08.07 09:13:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 09:13:50 - OpenVPN > VERIFY EKU OK . 2014.08.07 09:13:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 09:13:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 09:13:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:13:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 09:13:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:13:54 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.07 09:13:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]108.59.8.142:443 . 2014.08.07 09:13:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.07 09:13:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.50.110 10.4.50.109' . 2014.08.07 09:13:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.07 09:13:56 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.07 09:13:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.07 09:13:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.07 09:13:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.07 09:13:56 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.07 09:13:56 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.07 09:13:57 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.07 09:13:57 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.07 09:13:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.110/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.50.109, lease-time: 31536000] . 2014.08.07 09:13:57 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.07 09:14:01 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.07 09:14:01 - OpenVPN > C:\Windows\system32\route.exe ADD 108.59.8.142 MASK 255.255.255.255 192.168.100.1 . 2014.08.07 09:14:01 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=12] . 2014.08.07 09:14:01 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:14:01 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:14:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:14:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.50.109 . 2014.08.07 09:14:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.07 09:14:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:14:02 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:14:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:14:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.50.109 . 2014.08.07 09:14:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.07 09:14:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:14:02 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:14:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:14:02 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.50.109 . 2014.08.07 09:14:02 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.07 09:14:02 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:14:02 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:14:02 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:14:02 - Starting Management Interface . 2014.08.07 09:14:02 - OpenVPN > Initialization Sequence Completed ! 2014.08.07 09:14:02 - Flushing DNS ! 2014.08.07 09:14:02 - Checking route ! 2014.08.07 09:14:03 - Connected. . 2014.08.07 09:14:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.07 09:14:03 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,2] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,3] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,4] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,5] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,6] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,7] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,8] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,9] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,10] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:51:14 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=38 Tx=[2373079,1544675] Rx=[998779,11] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 09:56:03 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.07 09:56:03 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.07 09:56:03 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.07 09:56:04 - Disconnecting . 2014.08.07 09:56:04 - Management - Send 'signal SIGTERM' . 2014.08.07 09:56:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.07 09:56:04 - OpenVPN > MANAGEMENT: Client disconnected . 2014.08.07 09:56:04 - OpenVPN > Assertion failed at misc.c:785 . 2014.08.07 09:56:04 - OpenVPN > Exiting due to fatal error . 2014.08.07 09:56:04 - Connection terminated. ! 2014.08.07 09:56:15 - Waiting for latency tests ! 2014.08.07 09:56:21 - Checking authorization ! 2014.08.07 09:56:22 - Connecting to Alkaid (United States, Chicago, Illinois) . 2014.08.07 09:56:22 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.07 09:56:22 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.07 09:56:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.07 09:56:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.07 09:56:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:56:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:56:23 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.07 09:56:23 - OpenVPN > UDPv4 link local: [undef] . 2014.08.07 09:56:23 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443 . 2014.08.07 09:56:25 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=09d8aea8 2691cf75 . 2014.08.07 09:56:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 09:56:33 - OpenVPN > Validating certificate key usage . 2014.08.07 09:56:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 09:56:33 - OpenVPN > VERIFY KU OK . 2014.08.07 09:56:33 - OpenVPN > Validating certificate extended key usage . 2014.08.07 09:56:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 09:56:33 - OpenVPN > VERIFY EKU OK . 2014.08.07 09:56:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 09:57:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 09:57:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:57:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 09:57:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:57:24 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2014.08.07 09:57:24 - OpenVPN > TLS Error: TLS handshake failed . 2014.08.07 09:57:24 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2014.08.07 09:57:24 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.07 09:57:24 - Disconnecting . 2014.08.07 09:57:24 - Connection terminated. ! 2014.08.07 09:57:27 - Checking authorization ! 2014.08.07 09:57:27 - Connecting to Alkaid (United States, Chicago, Illinois) . 2014.08.07 09:57:27 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.07 09:57:27 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.07 09:57:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.07 09:57:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.07 09:57:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:57:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:57:28 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.07 09:57:28 - OpenVPN > UDPv4 link local: [undef] . 2014.08.07 09:57:28 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443 . 2014.08.07 09:57:28 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=01a6723f 69943879 . 2014.08.07 09:57:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 09:57:28 - OpenVPN > Validating certificate key usage . 2014.08.07 09:57:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 09:57:28 - OpenVPN > VERIFY KU OK . 2014.08.07 09:57:28 - OpenVPN > Validating certificate extended key usage . 2014.08.07 09:57:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 09:57:28 - OpenVPN > VERIFY EKU OK . 2014.08.07 09:57:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 09:57:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 09:57:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:57:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 09:57:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 09:57:56 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.07 09:57:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443 . 2014.08.07 09:57:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.07 09:58:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.69.198 10.4.69.197' . 2014.08.07 09:58:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.07 09:58:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.07 09:58:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.07 09:58:00 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.07 09:58:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.07 09:58:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.07 09:58:00 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.07 09:58:01 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.07 09:58:01 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.07 09:58:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.69.198/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.69.197, lease-time: 31536000] . 2014.08.07 09:58:01 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.07 09:58:05 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.07 09:58:05 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.154.82 MASK 255.255.255.255 192.168.100.1 . 2014.08.07 09:58:05 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=12] . 2014.08.07 09:58:05 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:58:05 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:58:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:58:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.07 09:58:05 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.07 09:58:05 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:58:05 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:58:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:58:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.07 09:58:05 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.07 09:58:05 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:58:05 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:58:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:58:05 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.69.197 . 2014.08.07 09:58:05 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.07 09:58:05 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.07 09:58:05 - OpenVPN > Route addition fallback to route.exe . 2014.08.07 09:58:05 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.07 09:58:05 - Starting Management Interface . 2014.08.07 09:58:05 - OpenVPN > Initialization Sequence Completed ! 2014.08.07 09:58:05 - Flushing DNS ! 2014.08.07 09:58:05 - Checking route ! 2014.08.07 09:58:10 - Connected. . 2014.08.07 09:58:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.07 09:58:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.08.07 10:23:40 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=39 Tx=[2378131,1544675] Rx=[1002212,13] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 10:23:40 - OpenVPN > write to TUN/TAP [State=aT3c Err=[c:\users\samuli\tap-windows-github\src\tapdrvr.c/2369] #O=39 Tx=[2378131,1544675] Rx=[1002212,14] IrpQ=[1,1,16] PktQ=[0,64,64] InjQ=[0,1,16]]: General failure (ERROR_GEN_FAILURE) (code=31) . 2014.08.07 10:51:01 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.07 10:51:01 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.07 10:51:01 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.07 10:51:01 - Disconnecting . 2014.08.07 10:51:03 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.07 10:51:08 - Management - Send 'signal SIGTERM' . 2014.08.07 10:51:08 - OpenVPN > UDPv4 link local: [undef] . 2014.08.07 10:51:08 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443 . 2014.08.07 10:51:08 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=00187ddc a1eda33f . 2014.08.07 10:51:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.07 10:51:08 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.07 10:51:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 10:51:10 - OpenVPN > Validating certificate key usage . 2014.08.07 10:51:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 10:51:10 - OpenVPN > VERIFY KU OK . 2014.08.07 10:51:10 - OpenVPN > Validating certificate extended key usage . 2014.08.07 10:51:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 10:51:10 - OpenVPN > VERIFY EKU OK . 2014.08.07 10:51:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 10:51:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.69.197 . 2014.08.07 10:51:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.07 10:51:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.154.82 MASK 255.255.255.255 192.168.100.1 . 2014.08.07 10:51:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.07 10:51:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.07 10:51:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.07 10:51:13 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.07 10:51:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.07 10:51:13 - OpenVPN > Closing TUN/TAP interface . 2014.08.07 10:51:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2014.08.07 10:51:13 - Connection terminated. ! 2014.08.07 10:51:16 - Waiting for latency tests ! 2014.08.07 10:51:22 - Checking authorization ! 2014.08.07 10:51:23 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.07 10:51:23 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.07 10:51:23 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.07 10:51:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.07 10:51:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.07 10:51:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 10:51:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 10:51:23 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.07 10:51:23 - OpenVPN > UDPv4 link local: [undef] . 2014.08.07 10:51:23 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.07 10:51:29 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=4d5075c2 5e77ab0e . 2014.08.07 10:51:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 10:51:42 - OpenVPN > Validating certificate key usage . 2014.08.07 10:51:42 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 10:51:42 - OpenVPN > VERIFY KU OK . 2014.08.07 10:51:42 - OpenVPN > Validating certificate extended key usage . 2014.08.07 10:51:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 10:51:42 - OpenVPN > VERIFY EKU OK . 2014.08.07 10:51:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 10:52:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 10:52:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 10:52:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 10:52:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 10:52:13 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.07 10:52:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443 . 2014.08.07 10:52:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.07 10:52:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.56.194 10.4.56.193' . 2014.08.07 10:52:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.07 10:52:16 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.07 10:52:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.07 10:52:16 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.07 10:52:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.07 10:52:16 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.07 10:52:16 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.07 10:52:16 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.07 10:52:16 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.07 10:52:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.194/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.56.193, lease-time: 31536000] . 2014.08.07 10:52:16 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.07 10:52:16 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2014.08.07 10:52:16 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2014.08.07 10:52:16 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2014.08.07 10:52:21 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.07 10:52:21 - OpenVPN > C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.100.1 . 2014.08.07 10:52:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2014.08.07 10:52:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 10:52:21 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.07 10:52:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.07 10:52:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 10:52:21 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.07 10:52:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.07 10:52:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 10:52:21 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.56.193 . 2014.08.07 10:52:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.07 10:52:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 10:52:21 - Starting Management Interface . 2014.08.07 10:52:21 - OpenVPN > Initialization Sequence Completed ! 2014.08.07 10:52:21 - Flushing DNS ! 2014.08.07 10:52:21 - Checking route ! 2014.08.07 10:52:23 - Connected. . 2014.08.07 10:52:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.07 10:52:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.08.07 11:52:13 - OpenVPN > TLS: soft reset sec=0 bytes=33383590/0 pkts=57979/0 . 2014.08.07 11:52:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 11:52:21 - OpenVPN > Validating certificate key usage . 2014.08.07 11:52:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 11:52:21 - OpenVPN > VERIFY KU OK . 2014.08.07 11:52:21 - OpenVPN > Validating certificate extended key usage . 2014.08.07 11:52:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 11:52:21 - OpenVPN > VERIFY EKU OK . 2014.08.07 11:52:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 11:52:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 11:52:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 11:52:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 11:52:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 11:52:42 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA I 2014.08.07 12:52:13 - Renewing TLS key . 2014.08.07 12:52:13 - OpenVPN > TLS: tls_process: killed expiring key . 2014.08.07 12:52:42 - OpenVPN > TLS: soft reset sec=0 bytes=8219129/0 pkts=18686/0 . 2014.08.07 12:52:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 12:52:46 - OpenVPN > Validating certificate key usage . 2014.08.07 12:52:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 12:52:46 - OpenVPN > VERIFY KU OK . 2014.08.07 12:52:46 - OpenVPN > Validating certificate extended key usage . 2014.08.07 12:52:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 12:52:46 - OpenVPN > VERIFY EKU OK . 2014.08.07 12:52:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 12:53:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 12:53:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 12:53:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 12:53:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 12:53:26 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.07 13:15:00 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.07 13:15:00 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.07 13:15:00 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.07 13:15:01 - Disconnecting . 2014.08.07 13:15:01 - Management - Send 'signal SIGTERM' . 2014.08.07 13:15:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.07 13:15:01 - OpenVPN > MANAGEMENT: Client disconnected . 2014.08.07 13:15:01 - OpenVPN > Assertion failed at misc.c:785 . 2014.08.07 13:15:01 - OpenVPN > Exiting due to fatal error . 2014.08.07 13:15:01 - Connection terminated. ! 2014.08.07 13:15:04 - Waiting for latency tests ! 2014.08.07 13:15:10 - Checking authorization ! 2014.08.07 13:15:11 - Connecting to Alkaid (United States, Chicago, Illinois) . 2014.08.07 13:15:11 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.07 13:15:11 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.07 13:15:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.07 13:15:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.07 13:15:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 13:15:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 13:15:11 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.07 13:15:11 - OpenVPN > UDPv4 link local: [undef] . 2014.08.07 13:15:11 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443 . 2014.08.07 13:15:11 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=4baa3c55 7caded90 . 2014.08.07 13:15:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 13:15:14 - OpenVPN > Validating certificate key usage . 2014.08.07 13:15:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 13:15:14 - OpenVPN > VERIFY KU OK . 2014.08.07 13:15:14 - OpenVPN > Validating certificate extended key usage . 2014.08.07 13:15:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 13:15:14 - OpenVPN > VERIFY EKU OK . 2014.08.07 13:15:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 13:15:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 13:15:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 13:15:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 13:15:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 13:15:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.07 13:15:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443 . 2014.08.07 13:15:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.07 13:15:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.69.198 10.4.69.197' . 2014.08.07 13:15:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.07 13:15:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.07 13:15:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.07 13:15:19 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.07 13:15:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.07 13:15:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.07 13:15:19 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.07 13:15:20 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.07 13:15:20 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.07 13:15:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.69.198/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.69.197, lease-time: 31536000] . 2014.08.07 13:15:20 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.07 13:15:20 - OpenVPN > write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065) . 2014.08.07 13:15:24 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.07 13:15:24 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.154.82 MASK 255.255.255.255 192.168.100.1 . 2014.08.07 13:15:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2014.08.07 13:15:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 13:15:24 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.07 13:15:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.07 13:15:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 13:15:24 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.07 13:15:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.07 13:15:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 13:15:24 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.69.197 . 2014.08.07 13:15:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.08.07 13:15:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.08.07 13:15:24 - Starting Management Interface . 2014.08.07 13:15:24 - OpenVPN > Initialization Sequence Completed ! 2014.08.07 13:15:24 - Flushing DNS ! 2014.08.07 13:15:24 - Checking route ! 2014.08.07 13:15:25 - Connected. . 2014.08.07 13:15:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.07 13:15:25 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.08.07 14:15:17 - OpenVPN > TLS: soft reset sec=0 bytes=20732866/0 pkts=40933/0 . 2014.08.07 14:15:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 14:15:17 - OpenVPN > Validating certificate key usage . 2014.08.07 14:15:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 14:15:17 - OpenVPN > VERIFY KU OK . 2014.08.07 14:15:17 - OpenVPN > Validating certificate extended key usage . 2014.08.07 14:15:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 14:15:17 - OpenVPN > VERIFY EKU OK . 2014.08.07 14:15:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 14:15:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 14:15:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 14:15:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 14:15:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 14:15:22 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA I 2014.08.07 15:15:17 - Renewing TLS key . 2014.08.07 15:15:17 - OpenVPN > TLS: tls_process: killed expiring key . 2014.08.07 15:15:22 - OpenVPN > TLS: soft reset sec=0 bytes=19404821/0 pkts=36159/0 . 2014.08.07 15:15:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.07 15:15:22 - OpenVPN > Validating certificate key usage . 2014.08.07 15:15:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.07 15:15:22 - OpenVPN > VERIFY KU OK . 2014.08.07 15:15:22 - OpenVPN > Validating certificate extended key usage . 2014.08.07 15:15:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.07 15:15:22 - OpenVPN > VERIFY EKU OK . 2014.08.07 15:15:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.07 15:15:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 15:15:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 15:15:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.07 15:15:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.07 15:15:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.08 09:11:46 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.08 09:11:46 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.08 09:11:46 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.08 09:11:46 - Disconnecting . 2014.08.08 09:11:46 - Management - Send 'signal SIGTERM' . 2014.08.08 09:11:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.08 09:11:46 - OpenVPN > MANAGEMENT: Client disconnected . 2014.08.08 09:11:46 - OpenVPN > Assertion failed at misc.c:785 . 2014.08.08 09:11:46 - OpenVPN > Exiting due to fatal error . 2014.08.08 09:11:46 - Connection terminated. ! 2014.08.08 09:11:57 - Waiting for latency tests ! 2014.08.08 09:12:03 - Checking authorization ! 2014.08.08 09:12:04 - Connecting to Andromedae (United States, Manassas, Virginia) . 2014.08.08 09:12:04 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 09:12:04 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 09:12:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 09:12:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 09:12:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 09:12:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 09:12:04 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 09:12:04 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 09:12:04 - OpenVPN > UDPv4 link remote: [AF_INET]108.59.8.142:443 . 2014.08.08 09:12:04 - OpenVPN > TLS: Initial packet from [AF_INET]108.59.8.142:443, sid=10ae57ff 8b43efce . 2014.08.08 09:12:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 09:12:05 - OpenVPN > Validating certificate key usage . 2014.08.08 09:12:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 09:12:05 - OpenVPN > VERIFY KU OK . 2014.08.08 09:12:05 - OpenVPN > Validating certificate extended key usage . 2014.08.08 09:12:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 09:12:05 - OpenVPN > VERIFY EKU OK . 2014.08.08 09:12:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 09:12:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 09:12:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 09:12:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 09:12:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 09:12:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.08 09:12:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]108.59.8.142:443 . 2014.08.08 09:12:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.08 09:12:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.50.110 10.4.50.109' . 2014.08.08 09:12:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.08 09:12:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.08 09:12:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.08 09:12:09 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.08 09:12:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.08 09:12:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.08 09:12:09 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.08 09:12:09 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.08 09:12:09 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.08 09:12:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.50.110/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.50.109, lease-time: 31536000] . 2014.08.08 09:12:09 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.08 09:12:14 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.08 09:12:14 - OpenVPN > C:\Windows\system32\route.exe ADD 108.59.8.142 MASK 255.255.255.255 192.168.100.1 . 2014.08.08 09:12:14 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=12] . 2014.08.08 09:12:14 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 09:12:14 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 09:12:14 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 09:12:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.50.109 . 2014.08.08 09:12:14 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 09:12:14 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 09:12:14 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 09:12:14 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 09:12:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.50.109 . 2014.08.08 09:12:14 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 09:12:14 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 09:12:14 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 09:12:14 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 09:12:14 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.50.109 . 2014.08.08 09:12:14 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 09:12:14 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 09:12:14 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 09:12:14 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 09:12:14 - Starting Management Interface . 2014.08.08 09:12:14 - OpenVPN > Initialization Sequence Completed ! 2014.08.08 09:12:14 - Flushing DNS ! 2014.08.08 09:12:14 - Checking route ! 2014.08.08 09:12:18 - Connected. . 2014.08.08 09:12:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.08 09:12:18 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.08.08 10:12:06 - OpenVPN > TLS: soft reset sec=0 bytes=14769679/0 pkts=32064/0 . 2014.08.08 10:12:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 10:12:10 - OpenVPN > Validating certificate key usage . 2014.08.08 10:12:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 10:12:10 - OpenVPN > VERIFY KU OK . 2014.08.08 10:12:10 - OpenVPN > Validating certificate extended key usage . 2014.08.08 10:12:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 10:12:10 - OpenVPN > VERIFY EKU OK . 2014.08.08 10:12:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 10:12:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 10:12:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 10:12:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 10:12:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 10:12:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA I 2014.08.08 11:12:06 - Renewing TLS key . 2014.08.08 11:12:06 - OpenVPN > TLS: tls_process: killed expiring key . 2014.08.08 11:12:15 - OpenVPN > TLS: soft reset sec=0 bytes=40041702/0 pkts=67249/0 . 2014.08.08 11:12:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 11:12:16 - OpenVPN > Validating certificate key usage . 2014.08.08 11:12:16 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 11:12:16 - OpenVPN > VERIFY KU OK . 2014.08.08 11:12:16 - OpenVPN > Validating certificate extended key usage . 2014.08.08 11:12:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 11:12:16 - OpenVPN > VERIFY EKU OK . 2014.08.08 11:12:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 11:12:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 11:12:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 11:12:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 11:12:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 11:12:17 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA I 2014.08.08 12:12:15 - Renewing TLS key . 2014.08.08 12:12:15 - OpenVPN > TLS: tls_process: killed expiring key . 2014.08.08 12:12:17 - OpenVPN > TLS: soft reset sec=0 bytes=39426979/0 pkts=71128/0 . 2014.08.08 12:12:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 12:12:17 - OpenVPN > Validating certificate key usage . 2014.08.08 12:12:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 12:12:17 - OpenVPN > VERIFY KU OK . 2014.08.08 12:12:17 - OpenVPN > Validating certificate extended key usage . 2014.08.08 12:12:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 12:12:17 - OpenVPN > VERIFY EKU OK . 2014.08.08 12:12:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 12:12:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 12:12:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 12:12:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 12:12:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 12:12:18 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.08 12:44:46 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.08 12:44:46 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.08 12:44:46 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.08 12:44:47 - Disconnecting . 2014.08.08 12:44:47 - Management - Send 'signal SIGTERM' . 2014.08.08 12:44:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.08 12:44:47 - OpenVPN > MANAGEMENT: Client disconnected . 2014.08.08 12:44:47 - OpenVPN > Assertion failed at misc.c:785 . 2014.08.08 12:44:47 - OpenVPN > Exiting due to fatal error . 2014.08.08 12:44:47 - Connection terminated. ! 2014.08.08 12:44:50 - Waiting for latency tests ! 2014.08.08 12:44:59 - Checking authorization ! 2014.08.08 12:45:00 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 12:45:01 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 12:45:01 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 12:45:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 12:45:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 12:45:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 12:45:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 12:45:01 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 12:45:01 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 12:45:01 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 12:45:01 - OpenVPN > TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=f960e4b4 6c19e427 . 2014.08.08 12:45:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 12:45:07 - OpenVPN > Validating certificate key usage . 2014.08.08 12:45:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 12:45:07 - OpenVPN > VERIFY KU OK . 2014.08.08 12:45:07 - OpenVPN > Validating certificate extended key usage . 2014.08.08 12:45:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 12:45:07 - OpenVPN > VERIFY EKU OK . 2014.08.08 12:45:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 12:45:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 12:45:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 12:45:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 12:45:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 12:45:13 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.08 12:45:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443 . 2014.08.08 12:45:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.08 12:45:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.56.194 10.4.56.193' . 2014.08.08 12:45:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.08 12:45:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.08 12:45:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.08 12:45:15 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.08 12:45:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.08 12:45:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.08 12:45:15 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.08 12:45:16 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.08 12:45:16 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.08 12:45:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.56.194/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.56.193, lease-time: 31536000] . 2014.08.08 12:45:16 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.08 12:45:20 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.08 12:45:20 - OpenVPN > C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.100.1 . 2014.08.08 12:45:20 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=12] . 2014.08.08 12:45:20 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 12:45:20 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 12:45:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 12:45:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.08 12:45:20 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 12:45:20 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 12:45:20 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 12:45:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 12:45:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.56.193 . 2014.08.08 12:45:20 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 12:45:20 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 12:45:20 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 12:45:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 12:45:20 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.56.193 . 2014.08.08 12:45:20 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 12:45:20 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 12:45:20 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 12:45:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 12:45:20 - Starting Management Interface . 2014.08.08 12:45:20 - OpenVPN > Initialization Sequence Completed ! 2014.08.08 12:45:20 - Flushing DNS ! 2014.08.08 12:45:20 - Checking route ! 2014.08.08 12:45:23 - Connected. . 2014.08.08 12:45:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.08 12:45:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.08.08 13:56:35 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.08 13:56:35 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.08 13:56:35 - OpenVPN > Restart pause, 2 second(s) ! 2014.08.08 13:56:35 - Disconnecting . 2014.08.08 13:56:36 - Management - Send 'signal SIGTERM' . 2014.08.08 13:56:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.08 13:56:36 - OpenVPN > MANAGEMENT: Client disconnected . 2014.08.08 13:56:36 - OpenVPN > Assertion failed at misc.c:785 . 2014.08.08 13:56:36 - OpenVPN > Exiting due to fatal error . 2014.08.08 13:56:36 - Connection terminated. ! 2014.08.08 13:56:45 - Waiting for latency tests ! 2014.08.08 13:56:52 - Checking authorization ! 2014.08.08 13:56:53 - Connecting to Alkaid (United States, Chicago, Illinois) . 2014.08.08 13:56:53 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 13:56:53 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 13:56:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 13:56:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 13:56:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 13:56:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 13:56:53 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 13:56:53 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 13:56:53 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443 . 2014.08.08 13:56:53 - OpenVPN > TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=f37f4cdd fe850f6b . 2014.08.08 13:56:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 13:56:57 - OpenVPN > Validating certificate key usage . 2014.08.08 13:56:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 13:56:57 - OpenVPN > VERIFY KU OK . 2014.08.08 13:56:57 - OpenVPN > Validating certificate extended key usage . 2014.08.08 13:56:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 13:56:57 - OpenVPN > VERIFY EKU OK . 2014.08.08 13:56:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 13:57:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 13:57:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 13:57:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 13:57:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 13:57:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.08 13:57:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443 . 2014.08.08 13:57:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.08.08 13:57:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.69.198 10.4.69.197' . 2014.08.08 13:57:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.08.08 13:57:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.08.08 13:57:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.08.08 13:57:08 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.08.08 13:57:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.08.08 13:57:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.08.08 13:57:08 - OpenVPN > open_tun, tt->ipv6=0 . 2014.08.08 13:57:09 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{57769DC4-57E1-423E-AEF3-DEDE6E30A306}.tap . 2014.08.08 13:57:09 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.08.08 13:57:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.69.198/255.255.255.252 on interface {57769DC4-57E1-423E-AEF3-DEDE6E30A306} [DHCP-serv: 10.4.69.197, lease-time: 31536000] . 2014.08.08 13:57:09 - OpenVPN > Successful ARP Flush on interface [17] {57769DC4-57E1-423E-AEF3-DEDE6E30A306} . 2014.08.08 13:57:13 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.08.08 13:57:13 - OpenVPN > C:\Windows\system32\route.exe ADD 46.21.154.82 MASK 255.255.255.255 192.168.100.1 . 2014.08.08 13:57:13 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=12] . 2014.08.08 13:57:13 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 13:57:13 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 13:57:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 13:57:13 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.08 13:57:13 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 13:57:13 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 13:57:13 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 13:57:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 13:57:13 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.08 13:57:13 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 13:57:13 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 13:57:13 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 13:57:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 13:57:13 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.69.197 . 2014.08.08 13:57:13 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17] . 2014.08.08 13:57:13 - OpenVPN > Route addition via IPAPI failed [adaptive] . 2014.08.08 13:57:13 - OpenVPN > Route addition fallback to route.exe . 2014.08.08 13:57:13 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 13:57:13 - Starting Management Interface . 2014.08.08 13:57:13 - OpenVPN > Initialization Sequence Completed ! 2014.08.08 13:57:13 - Flushing DNS ! 2014.08.08 13:57:13 - Checking route ! 2014.08.08 13:57:14 - Connected. . 2014.08.08 13:57:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.08.08 13:57:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.08.08 14:57:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 14:57:06 - OpenVPN > Validating certificate key usage . 2014.08.08 14:57:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 14:57:06 - OpenVPN > VERIFY KU OK . 2014.08.08 14:57:06 - OpenVPN > Validating certificate extended key usage . 2014.08.08 14:57:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 14:57:06 - OpenVPN > VERIFY EKU OK . 2014.08.08 14:57:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 14:57:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 14:57:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 14:57:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 14:57:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 14:57:16 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA I 2014.08.08 15:57:06 - Renewing TLS key . 2014.08.08 15:57:06 - OpenVPN > TLS: tls_process: killed expiring key . 2014.08.08 15:57:16 - OpenVPN > TLS: soft reset sec=0 bytes=9444290/0 pkts=22116/0 . 2014.08.08 15:57:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.08.08 15:57:19 - OpenVPN > Validating certificate key usage . 2014.08.08 15:57:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.08.08 15:57:19 - OpenVPN > VERIFY KU OK . 2014.08.08 15:57:19 - OpenVPN > Validating certificate extended key usage . 2014.08.08 15:57:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.08.08 15:57:19 - OpenVPN > VERIFY EKU OK . 2014.08.08 15:57:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.08.08 15:57:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 15:57:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 15:57:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.08.08 15:57:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 15:57:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.08.08 21:28:34 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.08.08 21:28:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.08.08 21:28:36 - OpenVPN > Restart pause, 2 second(s) . 2014.08.08 21:28:36 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:28:36 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:28:36 - OpenVPN > UDPv4 link remote: [AF_INET]46.21.154.82:443 ! 2014.08.08 21:28:36 - Disconnecting . 2014.08.08 21:28:36 - Management - Send 'signal SIGTERM' . 2014.08.08 21:28:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.08.08 21:28:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:28:41 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.69.197 . 2014.08.08 21:28:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.08 21:28:41 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.21.154.82 MASK 255.255.255.255 192.168.100.1 . 2014.08.08 21:28:41 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 192.168.100.1 . 2014.08.08 21:28:41 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2014.08.08 21:28:41 - OpenVPN > Route deletion fallback to route.exe . 2014.08.08 21:28:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2014.08.08 21:28:41 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.08 21:28:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.08 21:28:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.69.197 . 2014.08.08 21:28:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.08.08 21:28:42 - OpenVPN > Closing TUN/TAP interface . 2014.08.08 21:28:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2014.08.08 21:28:42 - Connection terminated. ! 2014.08.08 21:28:45 - Waiting for latency tests ! 2014.08.08 21:28:51 - Checking authorization ! 2014.08.08 21:28:52 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:28:52 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:28:52 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:28:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:28:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:28:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:28:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:28:52 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:28:52 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:28:52 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 21:29:24 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2014.08.08 21:29:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:29:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.08.08 21:29:30 - Disconnecting . 2014.08.08 21:29:30 - Connection terminated. ! 2014.08.08 21:29:33 - Checking authorization ! 2014.08.08 21:29:33 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:29:33 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:29:33 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:29:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:29:33 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:29:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:29:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:29:33 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:29:33 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:29:33 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 21:30:05 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2014.08.08 21:30:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:30:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.08.08 21:30:11 - Disconnecting . 2014.08.08 21:30:11 - Connection terminated. ! 2014.08.08 21:30:14 - Checking authorization ! 2014.08.08 21:30:14 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:30:14 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:30:14 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:30:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:30:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:30:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:30:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:30:15 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:30:15 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:30:15 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 21:30:47 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2014.08.08 21:30:47 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:30:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.08.08 21:30:52 - Disconnecting . 2014.08.08 21:30:52 - Connection terminated. ! 2014.08.08 21:30:55 - Checking authorization ! 2014.08.08 21:30:56 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:30:56 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:30:56 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:30:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:30:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:30:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:30:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:30:56 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:30:56 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:30:56 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 21:31:28 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2014.08.08 21:31:28 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:31:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.08.08 21:31:33 - Disconnecting . 2014.08.08 21:31:33 - Connection terminated. ! 2014.08.08 21:31:37 - Checking authorization ! 2014.08.08 21:31:37 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:31:37 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:31:37 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:31:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:31:37 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:31:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:31:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:31:37 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:31:37 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:31:37 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 21:32:09 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2014.08.08 21:32:09 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:32:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.08.08 21:32:14 - Disconnecting . 2014.08.08 21:32:14 - Connection terminated. ! 2014.08.08 21:32:17 - Checking authorization ! 2014.08.08 21:32:18 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:32:18 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:32:18 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:32:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:32:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:32:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:32:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:32:18 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:32:18 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:32:18 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 21:32:50 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2014.08.08 21:32:50 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:32:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.08.08 21:32:55 - Disconnecting . 2014.08.08 21:32:55 - Connection terminated. ! 2014.08.08 21:32:58 - Checking authorization ! 2014.08.08 21:32:59 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:32:59 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:32:59 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:32:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:32:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:32:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:32:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:32:59 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:32:59 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:32:59 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443 . 2014.08.08 21:33:31 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2014.08.08 21:33:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.08.08 21:33:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.08.08 21:33:37 - Disconnecting . 2014.08.08 21:33:37 - Connection terminated. ! 2014.08.08 21:33:40 - Checking authorization ! 2014.08.08 21:33:41 - Connecting to Pavonis (United States, Chicago, Illinois) . 2014.08.08 21:33:41 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 9 2014 . 2014.08.08 21:33:41 - OpenVPN > library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05 . 2014.08.08 21:33:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.08.08 21:33:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.08.08 21:33:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:33:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.08.08 21:33:41 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.08.08 21:33:41 - OpenVPN > UDPv4 link local: [undef] . 2014.08.08 21:33:41 - OpenVPN > UDPv4 link remote: [AF_INET]149.255.33.154:443