swap=0 2016-04-16 11:43:00 Contacting 149.255.33.154:80 via TCP 2016-04-16 11:43:00 EVENT: WAIT 2016-04-16 11:43:00 SetTunnelSocket returned 1 2016-04-16 11:43:00 Connecting to 149.255.33.154:80 (149.255.33.154) via TCPv4 2016-04-16 11:43:01 EVENT: CONNECTING 2016-04-16 11:43:01 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 11:43:01 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 11:43:01 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 11:43:01 VERIFY OK: depth=0 cert. version : 3 serial number : 44 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:44:55 expires on : 2024-04-08 10:44:55 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 11:43:03 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 11:43:03 Session is ACTIVE 2016-04-16 11:43:03 EVENT: GET_CONFIG 2016-04-16 11:43:03 Sending PUSH_REQUEST to server... 2016-04-16 11:43:04 Sending PUSH_REQUEST to server... 2016-04-16 11:43:04 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.7.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.7.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.7.0.152] [255.255.0.0] 2016-04-16 11:43:04 LZO-ASYM init swap=0 asym=1 2016-04-16 11:43:04 Comp-stub init swap=0 2016-04-16 11:43:04 EVENT: ASSIGN_IP 2016-04-16 11:43:04 TunPersist: saving tun context: Session Name: 149.255.33.154 Remote Address: 149.255.33.154 Tunnel Addresses: 10.7.0.152/16 -> 10.7.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.7.0.1 Search Domains: 2016-04-16 11:43:04 Connected via tun 2016-04-16 11:43:04 EVENT: CONNECTED @149.255.33.154:80 (149.255.33.154) via /TCPv4 on tun/10.7.0.152/ 2016-04-16 11:43:04 SetStatus Connected 2016-04-16 11:43:06 TUN reset routes 2016-04-16 11:43:06 EVENT: DISCONNECTED 2016-04-16 11:43:06 Raw stats on disconnect: BYTES_IN : 6380 BYTES_OUT : 4549 PACKETS_IN : 14 PACKETS_OUT : 17 TUN_BYTES_IN : 189 TUN_BYTES_OUT : 1494 TUN_PACKETS_IN : 3 TUN_PACKETS_OUT : 3 2016-04-16 11:43:06 Performance stats on disconnect: CPU usage (microseconds): 2076682 Tunnel compression ratio (uplink): 24.0688 Tunnel compression ratio (downlink): 4.27041 Network bytes per CPU second: 5262 Tunnel bytes per CPU second: 810 2016-04-16 11:43:06 ----- OpenVPN Stop ----- 2016-04-16 11:43:08 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 11:43:08 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [rcvbuf] [262144] 13 [sndbuf] [262144] 2016-04-16 11:43:08 EVENT: RESOLVE 2016-04-16 11:43:08 LZO-ASYM init swap=0 asym=1 2016-04-16 11:43:08 Comp-stub init swap=0 2016-04-16 11:43:08 Contacting 46.165.208.65:80 via TCP 2016-04-16 11:43:08 EVENT: WAIT 2016-04-16 11:43:08 SetTunnelSocket returned 1 2016-04-16 11:43:08 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 11:43:08 EVENT: CONNECTING 2016-04-16 11:43:08 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 11:43:08 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 11:43:09 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 11:43:09 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 11:43:11 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 11:43:11 Session is ACTIVE 2016-04-16 11:43:11 EVENT: GET_CONFIG 2016-04-16 11:43:11 Sending PUSH_REQUEST to server... 2016-04-16 11:43:12 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.7.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.7.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.7.0.163] [255.255.0.0] 2016-04-16 11:43:12 LZO-ASYM init swap=0 asym=1 2016-04-16 11:43:12 Comp-stub init swap=0 2016-04-16 11:43:12 EVENT: ASSIGN_IP 2016-04-16 11:43:12 TunPersist: saving tun context: Session Name: 46.165.208.65 Remote Address: 46.165.208.65 Tunnel Addresses: 10.7.0.163/16 -> 10.7.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.7.0.1 Search Domains: 2016-04-16 11:43:12 Connected via tun 2016-04-16 11:43:12 EVENT: CONNECTED @46.165.208.65:80 (46.165.208.65) via /TCPv4 on tun/10.7.0.163/ 2016-04-16 11:43:12 SetStatus Connected 2016-04-16 11:52:38 OS Event: SLEEP 2016-04-16 11:52:38 EVENT: PAUSE 2016-04-16 11:52:45 OS Event: WAKEUP 2016-04-16 11:52:48 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 11:52:48 EVENT: RESUME 2016-04-16 11:52:48 EVENT: RECONNECTING 2016-04-16 11:52:48 LZO-ASYM init swap=0 asym=1 2016-04-16 11:52:48 Comp-stub init swap=0 2016-04-16 11:52:48 Contacting 46.165.208.65:80 via TCP 2016-04-16 11:52:48 EVENT: WAIT 2016-04-16 11:52:48 SetTunnelSocket returned 1 2016-04-16 11:52:49 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 11:52:50 OS Event: SLEEP 2016-04-16 11:52:50 EVENT: PAUSE 2016-04-16 11:59:45 OS Event: WAKEUP 2016-04-16 11:59:48 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 11:59:48 EVENT: RESUME 2016-04-16 11:59:48 EVENT: RECONNECTING 2016-04-16 11:59:48 LZO-ASYM init swap=0 asym=1 2016-04-16 11:59:48 Comp-stub init swap=0 2016-04-16 11:59:48 Contacting 46.165.208.65:80 via TCP 2016-04-16 11:59:48 EVENT: WAIT 2016-04-16 11:59:48 SetTunnelSocket returned 1 2016-04-16 11:59:49 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 11:59:51 EVENT: CONNECTING 2016-04-16 11:59:51 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 11:59:51 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 12:00:23 OS Event: SLEEP 2016-04-16 12:00:23 EVENT: PAUSE 2016-04-16 12:00:27 OS Event: WAKEUP 2016-04-16 12:00:30 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:00:30 EVENT: RESUME 2016-04-16 12:00:30 EVENT: RECONNECTING 2016-04-16 12:00:30 LZO-ASYM init swap=0 asym=1 2016-04-16 12:00:30 Comp-stub init swap=0 2016-04-16 12:00:30 Contacting 46.165.208.65:80 via TCP 2016-04-16 12:00:30 EVENT: WAIT 2016-04-16 12:00:30 SetTunnelSocket returned 1 2016-04-16 12:00:31 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 12:00:32 OS Event: SLEEP 2016-04-16 12:00:32 EVENT: PAUSE 2016-04-16 12:00:36 OS Event: WAKEUP 2016-04-16 12:00:39 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:00:39 EVENT: RESUME 2016-04-16 12:00:39 EVENT: RECONNECTING 2016-04-16 12:00:39 LZO-ASYM init swap=0 asym=1 2016-04-16 12:00:39 Comp-stub init swap=0 2016-04-16 12:00:39 Contacting 46.165.208.65:80 via TCP 2016-04-16 12:00:39 EVENT: WAIT 2016-04-16 12:00:39 SetTunnelSocket returned 1 2016-04-16 12:00:40 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 12:00:41 OS Event: SLEEP 2016-04-16 12:00:41 EVENT: PAUSE 2016-04-16 12:07:58 OS Event: WAKEUP 2016-04-16 12:08:01 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:08:01 EVENT: RESUME 2016-04-16 12:08:01 EVENT: RECONNECTING 2016-04-16 12:08:01 LZO-ASYM init swap=0 asym=1 2016-04-16 12:08:01 Comp-stub init swap=0 2016-04-16 12:08:01 Contacting 46.165.208.65:80 via TCP 2016-04-16 12:08:01 EVENT: WAIT 2016-04-16 12:08:01 SetTunnelSocket returned 1 2016-04-16 12:08:02 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 12:08:04 EVENT: CONNECTING 2016-04-16 12:08:04 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 12:08:04 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 12:08:33 OS Event: SLEEP 2016-04-16 12:08:33 EVENT: PAUSE 2016-04-16 12:08:38 OS Event: WAKEUP 2016-04-16 12:08:41 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:08:41 EVENT: RESUME 2016-04-16 12:08:41 EVENT: RECONNECTING 2016-04-16 12:08:41 LZO-ASYM init swap=0 asym=1 2016-04-16 12:08:41 Comp-stub init swap=0 2016-04-16 12:08:41 Contacting 46.165.208.65:80 via TCP 2016-04-16 12:08:41 EVENT: WAIT 2016-04-16 12:08:41 SetTunnelSocket returned 1 2016-04-16 12:08:42 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 12:08:43 OS Event: SLEEP 2016-04-16 12:08:43 EVENT: PAUSE 2016-04-16 12:18:24 OS Event: WAKEUP 2016-04-16 12:18:27 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:18:27 EVENT: RESUME 2016-04-16 12:18:27 EVENT: RECONNECTING 2016-04-16 12:18:27 LZO-ASYM init swap=0 asym=1 2016-04-16 12:18:27 Comp-stub init swap=0 2016-04-16 12:18:27 Contacting 46.165.208.65:80 via TCP 2016-04-16 12:18:27 EVENT: WAIT 2016-04-16 12:18:27 SetTunnelSocket returned 1 2016-04-16 12:18:28 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 12:18:30 EVENT: CONNECTING 2016-04-16 12:18:30 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 12:18:30 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 12:18:55 EVENT: DISCONNECTED 2016-04-16 12:18:55 Raw stats on disconnect: BYTES_IN : 7786600 BYTES_OUT : 886007 PACKETS_IN : 4749 PACKETS_OUT : 5451 TUN_BYTES_IN : 627010 TUN_BYTES_OUT : 7414561 TUN_PACKETS_IN : 5379 TUN_PACKETS_OUT : 6838 REPLAY_ERROR : 15 N_PAUSE : 7 N_RECONNECT : 7 PKTID_TCP_OUT_OF_SEQ : 15 2016-04-16 12:18:55 Performance stats on disconnect: CPU usage (microseconds): 4119798 Tunnel compression ratio (uplink): 1.41307 Tunnel compression ratio (downlink): 1.05018 Network bytes per CPU second: 2105104 Tunnel bytes per CPU second: 1951933 2016-04-16 12:18:55 ----- OpenVPN Stop ----- 2016-04-16 12:18:57 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 12:18:57 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [rcvbuf] [262144] 13 [sndbuf] [262144] 2016-04-16 12:18:57 EVENT: RESOLVE 2016-04-16 12:18:57 LZO-ASYM init swap=0 asym=1 2016-04-16 12:18:57 Comp-stub init swap=0 2016-04-16 12:18:57 Contacting 46.165.208.65:443 via TCP 2016-04-16 12:18:57 EVENT: WAIT 2016-04-16 12:18:57 SetTunnelSocket returned 1 2016-04-16 12:18:58 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 12:19:00 EVENT: CONNECTING 2016-04-16 12:19:00 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 12:19:00 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 12:19:00 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 12:19:00 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 12:19:03 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 12:19:03 Session is ACTIVE 2016-04-16 12:19:03 EVENT: GET_CONFIG 2016-04-16 12:19:03 Sending PUSH_REQUEST to server... 2016-04-16 12:19:03 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.5.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.5.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.5.3.75] [255.255.0.0] 2016-04-16 12:19:03 LZO-ASYM init swap=0 asym=1 2016-04-16 12:19:03 Comp-stub init swap=0 2016-04-16 12:19:03 EVENT: ASSIGN_IP 2016-04-16 12:19:03 TunPersist: saving tun context: Session Name: 46.165.208.65 Remote Address: 46.165.208.65 Tunnel Addresses: 10.5.3.75/16 -> 10.5.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.5.0.1 Search Domains: 2016-04-16 12:19:03 Connected via tun 2016-04-16 12:19:03 EVENT: CONNECTED @46.165.208.65:443 (46.165.208.65) via /TCPv4 on tun/10.5.3.75/ 2016-04-16 12:19:03 SetStatus Connected 2016-04-16 12:25:41 OS Event: SLEEP 2016-04-16 12:25:41 EVENT: PAUSE 2016-04-16 12:25:44 OS Event: WAKEUP 2016-04-16 12:25:47 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:25:47 EVENT: RESUME 2016-04-16 12:25:47 EVENT: RECONNECTING 2016-04-16 12:25:47 LZO-ASYM init swap=0 asym=1 2016-04-16 12:25:47 Comp-stub init swap=0 2016-04-16 12:25:47 Contacting 46.165.208.65:443 via TCP 2016-04-16 12:25:47 EVENT: WAIT 2016-04-16 12:25:47 SetTunnelSocket returned 1 2016-04-16 12:25:49 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 12:25:50 OS Event: SLEEP 2016-04-16 12:25:50 EVENT: PAUSE 2016-04-16 12:35:09 OS Event: WAKEUP 2016-04-16 12:35:12 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:35:12 EVENT: RESUME 2016-04-16 12:35:12 EVENT: RECONNECTING 2016-04-16 12:35:12 LZO-ASYM init swap=0 asym=1 2016-04-16 12:35:12 Comp-stub init swap=0 2016-04-16 12:35:12 Contacting 46.165.208.65:443 via TCP 2016-04-16 12:35:12 EVENT: WAIT 2016-04-16 12:35:12 SetTunnelSocket returned 1 2016-04-16 12:35:22 Server poll timeout, trying next remote entry... 2016-04-16 12:35:22 EVENT: RECONNECTING 2016-04-16 12:35:22 LZO-ASYM init swap=0 asym=1 2016-04-16 12:35:22 Comp-stub init swap=0 2016-04-16 12:35:22 Contacting 46.165.208.65:443 via TCP 2016-04-16 12:35:22 EVENT: WAIT 2016-04-16 12:35:22 SetTunnelSocket returned 1 2016-04-16 12:35:32 Server poll timeout, trying next remote entry... 2016-04-16 12:35:32 EVENT: RECONNECTING 2016-04-16 12:35:32 LZO-ASYM init swap=0 asym=1 2016-04-16 12:35:32 Comp-stub init swap=0 2016-04-16 12:35:32 Contacting 46.165.208.65:443 via TCP 2016-04-16 12:35:32 EVENT: WAIT 2016-04-16 12:35:32 SetTunnelSocket returned 1 2016-04-16 12:35:34 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 12:35:37 EVENT: CONNECTING 2016-04-16 12:35:37 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 12:35:37 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 12:35:47 OS Event: SLEEP 2016-04-16 12:35:47 EVENT: PAUSE 2016-04-16 12:35:50 OS Event: WAKEUP 2016-04-16 12:35:53 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 12:35:53 EVENT: RESUME 2016-04-16 12:35:53 EVENT: RECONNECTING 2016-04-16 12:35:53 LZO-ASYM init swap=0 asym=1 2016-04-16 12:35:53 Comp-stub init swap=0 2016-04-16 12:35:54 Contacting 46.165.208.65:443 via TCP 2016-04-16 12:35:54 EVENT: WAIT 2016-04-16 12:35:54 SetTunnelSocket returned 1 2016-04-16 12:35:56 OS Event: SLEEP 2016-04-16 12:35:56 EVENT: PAUSE 2016-04-16 13:00:58 OS Event: WAKEUP 2016-04-16 13:01:01 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:01:01 EVENT: RESUME 2016-04-16 13:01:01 EVENT: RECONNECTING 2016-04-16 13:01:01 LZO-ASYM init swap=0 asym=1 2016-04-16 13:01:01 Comp-stub init swap=0 2016-04-16 13:01:01 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:01:01 EVENT: WAIT 2016-04-16 13:01:01 SetTunnelSocket returned 1 2016-04-16 13:01:04 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:01:07 EVENT: CONNECTING 2016-04-16 13:01:07 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:01:07 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:01:47 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:01:47 Client terminated, restarting in 2... 2016-04-16 13:01:49 EVENT: RECONNECTING 2016-04-16 13:01:49 LZO-ASYM init swap=0 asym=1 2016-04-16 13:01:49 Comp-stub init swap=0 2016-04-16 13:01:49 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:01:49 EVENT: WAIT 2016-04-16 13:01:49 SetTunnelSocket returned 1 2016-04-16 13:01:52 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:01:55 EVENT: CONNECTING 2016-04-16 13:01:55 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:01:55 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:02:03 OS Event: SLEEP 2016-04-16 13:02:03 EVENT: PAUSE 2016-04-16 13:02:08 OS Event: WAKEUP 2016-04-16 13:02:11 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:02:11 EVENT: RESUME 2016-04-16 13:02:11 EVENT: RECONNECTING 2016-04-16 13:02:11 LZO-ASYM init swap=0 asym=1 2016-04-16 13:02:11 Comp-stub init swap=0 2016-04-16 13:02:11 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:02:11 EVENT: WAIT 2016-04-16 13:02:11 SetTunnelSocket returned 1 2016-04-16 13:02:13 OS Event: SLEEP 2016-04-16 13:02:13 EVENT: PAUSE 2016-04-16 13:20:17 OS Event: WAKEUP 2016-04-16 13:20:21 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:20:21 EVENT: RESUME 2016-04-16 13:20:21 EVENT: RECONNECTING 2016-04-16 13:20:21 LZO-ASYM init swap=0 asym=1 2016-04-16 13:20:21 Comp-stub init swap=0 2016-04-16 13:20:21 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:20:21 EVENT: WAIT 2016-04-16 13:20:21 SetTunnelSocket returned 1 2016-04-16 13:20:31 Server poll timeout, trying next remote entry... 2016-04-16 13:20:31 EVENT: RECONNECTING 2016-04-16 13:20:31 LZO-ASYM init swap=0 asym=1 2016-04-16 13:20:31 Comp-stub init swap=0 2016-04-16 13:20:31 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:20:31 EVENT: WAIT 2016-04-16 13:20:31 SetTunnelSocket returned 1 2016-04-16 13:20:32 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:20:34 EVENT: CONNECTING 2016-04-16 13:20:34 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:20:34 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:21:14 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:21:14 Client terminated, restarting in 2... 2016-04-16 13:21:16 EVENT: RECONNECTING 2016-04-16 13:21:16 LZO-ASYM init swap=0 asym=1 2016-04-16 13:21:16 Comp-stub init swap=0 2016-04-16 13:21:16 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:21:16 EVENT: WAIT 2016-04-16 13:21:16 SetTunnelSocket returned 1 2016-04-16 13:21:21 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:21:24 EVENT: CONNECTING 2016-04-16 13:21:24 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:21:24 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:22:04 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:22:04 Client terminated, restarting in 2... 2016-04-16 13:22:06 EVENT: RECONNECTING 2016-04-16 13:22:06 LZO-ASYM init swap=0 asym=1 2016-04-16 13:22:06 Comp-stub init swap=0 2016-04-16 13:22:06 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:22:06 EVENT: WAIT 2016-04-16 13:22:06 SetTunnelSocket returned 1 2016-04-16 13:22:09 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:22:09 EVENT: CONNECTING 2016-04-16 13:22:09 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:22:09 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:22:09 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:22:09 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:22:54 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:22:54 Client terminated, restarting in 2... 2016-04-16 13:22:56 EVENT: RECONNECTING 2016-04-16 13:22:56 LZO-ASYM init swap=0 asym=1 2016-04-16 13:22:56 Comp-stub init swap=0 2016-04-16 13:22:56 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:22:56 EVENT: WAIT 2016-04-16 13:22:56 SetTunnelSocket returned 1 2016-04-16 13:22:56 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:22:57 EVENT: CONNECTING 2016-04-16 13:22:57 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:22:57 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:22:57 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:22:57 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:23:44 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:23:44 Client terminated, restarting in 2... 2016-04-16 13:23:46 EVENT: RECONNECTING 2016-04-16 13:23:46 LZO-ASYM init swap=0 asym=1 2016-04-16 13:23:46 Comp-stub init swap=0 2016-04-16 13:23:46 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:23:46 EVENT: WAIT 2016-04-16 13:23:46 SetTunnelSocket returned 1 2016-04-16 13:23:50 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:23:53 EVENT: CONNECTING 2016-04-16 13:23:53 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:23:53 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:24:33 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:24:33 Client terminated, restarting in 2... 2016-04-16 13:24:35 EVENT: RECONNECTING 2016-04-16 13:24:35 LZO-ASYM init swap=0 asym=1 2016-04-16 13:24:35 Comp-stub init swap=0 2016-04-16 13:24:35 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:24:35 EVENT: WAIT 2016-04-16 13:24:35 SetTunnelSocket returned 1 2016-04-16 13:24:38 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:24:41 EVENT: CONNECTING 2016-04-16 13:24:41 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:24:41 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:25:21 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:25:21 Client terminated, restarting in 2... 2016-04-16 13:25:23 EVENT: RECONNECTING 2016-04-16 13:25:23 LZO-ASYM init swap=0 asym=1 2016-04-16 13:25:23 Comp-stub init swap=0 2016-04-16 13:25:23 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:25:23 EVENT: WAIT 2016-04-16 13:25:23 SetTunnelSocket returned 1 2016-04-16 13:25:26 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:25:29 EVENT: CONNECTING 2016-04-16 13:25:29 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:25:29 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:26:09 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:26:09 Client terminated, restarting in 2... 2016-04-16 13:26:11 EVENT: RECONNECTING 2016-04-16 13:26:11 LZO-ASYM init swap=0 asym=1 2016-04-16 13:26:11 Comp-stub init swap=0 2016-04-16 13:26:11 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:26:11 EVENT: WAIT 2016-04-16 13:26:11 SetTunnelSocket returned 1 2016-04-16 13:26:14 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:26:21 Server poll timeout, trying next remote entry... 2016-04-16 13:26:21 EVENT: RECONNECTING 2016-04-16 13:26:21 LZO-ASYM init swap=0 asym=1 2016-04-16 13:26:21 Comp-stub init swap=0 2016-04-16 13:26:21 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:26:21 EVENT: WAIT 2016-04-16 13:26:21 SetTunnelSocket returned 1 2016-04-16 13:26:31 Server poll timeout, trying next remote entry... 2016-04-16 13:26:31 EVENT: RECONNECTING 2016-04-16 13:26:31 LZO-ASYM init swap=0 asym=1 2016-04-16 13:26:31 Comp-stub init swap=0 2016-04-16 13:26:31 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:26:31 EVENT: WAIT 2016-04-16 13:26:31 SetTunnelSocket returned 1 2016-04-16 13:26:36 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:26:36 EVENT: CONNECTING 2016-04-16 13:26:36 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:26:36 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:26:37 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:26:37 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:26:42 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 13:26:42 Session is ACTIVE 2016-04-16 13:26:42 EVENT: GET_CONFIG 2016-04-16 13:26:42 Sending PUSH_REQUEST to server... 2016-04-16 13:26:42 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.5.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.5.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.5.3.75] [255.255.0.0] 2016-04-16 13:26:42 LZO-ASYM init swap=0 asym=1 2016-04-16 13:26:42 Comp-stub init swap=0 2016-04-16 13:26:42 EVENT: ASSIGN_IP 2016-04-16 13:26:42 TunPersist: saving tun context: Session Name: 46.165.208.65 Remote Address: 46.165.208.65 Tunnel Addresses: 10.5.3.75/16 -> 10.5.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.5.0.1 Search Domains: 2016-04-16 13:26:42 Connected via tun 2016-04-16 13:26:42 EVENT: CONNECTED @46.165.208.65:443 (46.165.208.65) via /TCPv4 on tun/10.5.3.75/ 2016-04-16 13:26:42 SetStatus Connected 2016-04-16 13:29:01 OS Event: SLEEP 2016-04-16 13:29:01 EVENT: PAUSE 2016-04-16 13:29:04 OS Event: WAKEUP 2016-04-16 13:29:07 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:29:07 EVENT: RESUME 2016-04-16 13:29:07 EVENT: RECONNECTING 2016-04-16 13:29:07 LZO-ASYM init swap=0 asym=1 2016-04-16 13:29:07 Comp-stub init swap=0 2016-04-16 13:29:07 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:29:07 EVENT: WAIT 2016-04-16 13:29:07 SetTunnelSocket returned 1 2016-04-16 13:29:10 OS Event: SLEEP 2016-04-16 13:29:10 EVENT: PAUSE 2016-04-16 13:30:40 OS Event: WAKEUP 2016-04-16 13:30:43 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:30:43 EVENT: RESUME 2016-04-16 13:30:43 EVENT: RECONNECTING 2016-04-16 13:30:43 LZO-ASYM init swap=0 asym=1 2016-04-16 13:30:43 Comp-stub init swap=0 2016-04-16 13:30:43 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:30:43 EVENT: WAIT 2016-04-16 13:30:43 SetTunnelSocket returned 1 2016-04-16 13:30:43 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:30:45 EVENT: CONNECTING 2016-04-16 13:30:45 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:30:45 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:31:25 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:31:25 Client terminated, restarting in 2... 2016-04-16 13:31:27 EVENT: RECONNECTING 2016-04-16 13:31:27 LZO-ASYM init swap=0 asym=1 2016-04-16 13:31:27 Comp-stub init swap=0 2016-04-16 13:31:27 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:31:27 EVENT: WAIT 2016-04-16 13:31:27 SetTunnelSocket returned 1 2016-04-16 13:31:29 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:31:29 EVENT: CONNECTING 2016-04-16 13:31:29 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:31:29 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:31:29 EVENT: DISCONNECTED 2016-04-16 13:31:29 Raw stats on disconnect: BYTES_IN : 136396969 BYTES_OUT : 4681514 PACKETS_IN : 72883 PACKETS_OUT : 38879 TUN_BYTES_IN : 2836910 TUN_BYTES_OUT : 131250723 TUN_PACKETS_IN : 38742 TUN_PACKETS_OUT : 96312 REPLAY_ERROR : 47 KEEPALIVE_TIMEOUT : 9 N_PAUSE : 8 N_RECONNECT : 22 PKTID_TCP_OUT_OF_SEQ : 47 2016-04-16 13:31:29 Performance stats on disconnect: CPU usage (microseconds): 27569042 Tunnel compression ratio (uplink): 1.65022 Tunnel compression ratio (downlink): 1.03921 Network bytes per CPU second: 5117279 Tunnel bytes per CPU second: 4863703 2016-04-16 13:31:29 ----- OpenVPN Stop ----- 2016-04-16 13:31:30 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:31:30 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [rcvbuf] [262144] 13 [sndbuf] [262144] 2016-04-16 13:31:30 EVENT: RESOLVE 2016-04-16 13:31:30 LZO-ASYM init swap=0 asym=1 2016-04-16 13:31:30 Comp-stub init swap=0 2016-04-16 13:31:30 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:31:30 EVENT: WAIT 2016-04-16 13:31:30 SetTunnelSocket returned 1 2016-04-16 13:31:31 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:31:35 EVENT: CONNECTING 2016-04-16 13:31:35 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:31:35 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:32:15 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:32:15 Client terminated, restarting in 2... 2016-04-16 13:32:17 EVENT: RECONNECTING 2016-04-16 13:32:17 LZO-ASYM init swap=0 asym=1 2016-04-16 13:32:17 Comp-stub init swap=0 2016-04-16 13:32:17 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:32:17 EVENT: WAIT 2016-04-16 13:32:17 SetTunnelSocket returned 1 2016-04-16 13:32:18 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:32:19 EVENT: CONNECTING 2016-04-16 13:32:19 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:32:19 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:32:19 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:32:19 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:32:38 EVENT: DISCONNECTED 2016-04-16 13:32:38 Raw stats on disconnect: BYTES_IN : 8581 BYTES_OUT : 4460 PACKETS_IN : 16 PACKETS_OUT : 20 REPLAY_ERROR : 6 KEEPALIVE_TIMEOUT : 1 N_RECONNECT : 1 PKTID_TCP_OUT_OF_SEQ : 6 2016-04-16 13:32:38 Performance stats on disconnect: CPU usage (microseconds): 2064779 Network bytes per CPU second: 6315 Tunnel bytes per CPU second: 0 2016-04-16 13:32:38 ----- OpenVPN Stop ----- 2016-04-16 13:32:42 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:32:42 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 2016-04-16 13:32:42 EVENT: RESOLVE 2016-04-16 13:32:42 LZO-ASYM init swap=0 asym=1 2016-04-16 13:32:42 Comp-stub init swap=0 2016-04-16 13:32:42 Contacting 149.255.33.154:80 via TCP 2016-04-16 13:32:42 EVENT: WAIT 2016-04-16 13:32:42 SetTunnelSocket returned 1 2016-04-16 13:32:42 Connecting to 149.255.33.154:80 (149.255.33.154) via TCPv4 2016-04-16 13:32:42 EVENT: CONNECTING 2016-04-16 13:32:42 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:32:42 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:32:42 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:32:42 VERIFY OK: depth=0 cert. version : 3 serial number : 44 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:44:55 expires on : 2024-04-08 10:44:55 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:32:45 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 13:32:45 Session is ACTIVE 2016-04-16 13:32:45 EVENT: GET_CONFIG 2016-04-16 13:32:45 Sending PUSH_REQUEST to server... 2016-04-16 13:32:46 Sending PUSH_REQUEST to server... 2016-04-16 13:32:46 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.7.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.7.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.7.0.152] [255.255.0.0] 2016-04-16 13:32:46 LZO-ASYM init swap=0 asym=1 2016-04-16 13:32:46 Comp-stub init swap=0 2016-04-16 13:32:46 EVENT: ASSIGN_IP 2016-04-16 13:32:46 TunPersist: saving tun context: Session Name: 149.255.33.154 Remote Address: 149.255.33.154 Tunnel Addresses: 10.7.0.152/16 -> 10.7.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.7.0.1 Search Domains: 2016-04-16 13:32:46 Connected via tun 2016-04-16 13:32:46 EVENT: CONNECTED @149.255.33.154:80 (149.255.33.154) via /TCPv4 on tun/10.7.0.152/ 2016-04-16 13:32:46 SetStatus Connected 2016-04-16 13:32:46 TUN reset routes 2016-04-16 13:32:46 EVENT: DISCONNECTED 2016-04-16 13:32:46 Raw stats on disconnect: BYTES_IN : 5214 BYTES_OUT : 4311 PACKETS_IN : 12 PACKETS_OUT : 15 TUN_BYTES_IN : 59 TUN_BYTES_OUT : 412 TUN_PACKETS_IN : 1 TUN_PACKETS_OUT : 1 2016-04-16 13:32:46 Performance stats on disconnect: CPU usage (microseconds): 2074282 Tunnel compression ratio (uplink): 73.0678 Tunnel compression ratio (downlink): 12.6553 Network bytes per CPU second: 4591 Tunnel bytes per CPU second: 227 2016-04-16 13:32:46 ----- OpenVPN Stop ----- 2016-04-16 13:32:50 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:32:50 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [rcvbuf] [262144] 13 [sndbuf] [262144] 2016-04-16 13:32:50 EVENT: RESOLVE 2016-04-16 13:32:50 LZO-ASYM init swap=0 asym=1 2016-04-16 13:32:50 Comp-stub init swap=0 2016-04-16 13:32:50 Contacting 46.165.208.65:80 via TCP 2016-04-16 13:32:50 EVENT: WAIT 2016-04-16 13:32:50 SetTunnelSocket returned 1 2016-04-16 13:32:51 Connecting to 46.165.208.65:80 (46.165.208.65) via TCPv4 2016-04-16 13:32:52 EVENT: CONNECTING 2016-04-16 13:32:52 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:32:52 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:32:52 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:32:52 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:33:05 EVENT: DISCONNECTED 2016-04-16 13:33:05 Raw stats on disconnect: BYTES_IN : 4501 BYTES_OUT : 3982 PACKETS_IN : 9 PACKETS_OUT : 12 REPLAY_ERROR : 1 PKTID_TCP_OUT_OF_SEQ : 1 2016-04-16 13:33:05 Performance stats on disconnect: CPU usage (microseconds): 2051569 Network bytes per CPU second: 4134 Tunnel bytes per CPU second: 0 2016-04-16 13:33:05 ----- OpenVPN Stop ----- 2016-04-16 13:33:07 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:33:07 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 2016-04-16 13:33:07 EVENT: RESOLVE 2016-04-16 13:33:07 LZO-ASYM init swap=0 asym=1 2016-04-16 13:33:07 Comp-stub init swap=0 2016-04-16 13:33:07 Contacting 149.255.33.154:80 via TCP 2016-04-16 13:33:07 EVENT: WAIT 2016-04-16 13:33:07 SetTunnelSocket returned 1 2016-04-16 13:33:07 Connecting to 149.255.33.154:80 (149.255.33.154) via TCPv4 2016-04-16 13:33:07 EVENT: CONNECTING 2016-04-16 13:33:07 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:33:07 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:33:07 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:33:07 VERIFY OK: depth=0 cert. version : 3 serial number : 44 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:44:55 expires on : 2024-04-08 10:44:55 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:33:10 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 13:33:10 Session is ACTIVE 2016-04-16 13:33:10 EVENT: GET_CONFIG 2016-04-16 13:33:10 Sending PUSH_REQUEST to server... 2016-04-16 13:33:11 Sending PUSH_REQUEST to server... 2016-04-16 13:33:11 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.7.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.7.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.7.0.152] [255.255.0.0] 2016-04-16 13:33:11 LZO-ASYM init swap=0 asym=1 2016-04-16 13:33:11 Comp-stub init swap=0 2016-04-16 13:33:11 EVENT: ASSIGN_IP 2016-04-16 13:33:11 TunPersist: saving tun context: Session Name: 149.255.33.154 Remote Address: 149.255.33.154 Tunnel Addresses: 10.7.0.152/16 -> 10.7.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.7.0.1 Search Domains: 2016-04-16 13:33:11 Connected via tun 2016-04-16 13:33:11 EVENT: CONNECTED @149.255.33.154:80 (149.255.33.154) via /TCPv4 on tun/10.7.0.152/ 2016-04-16 13:33:11 SetStatus Connected 2016-04-16 13:33:12 TUN reset routes 2016-04-16 13:33:12 EVENT: DISCONNECTED 2016-04-16 13:33:12 Raw stats on disconnect: BYTES_IN : 7629 BYTES_OUT : 5286 PACKETS_IN : 19 PACKETS_OUT : 24 TUN_BYTES_IN : 552 TUN_BYTES_OUT : 2395 TUN_PACKETS_IN : 10 TUN_PACKETS_OUT : 10 2016-04-16 13:33:12 Performance stats on disconnect: CPU usage (microseconds): 2081922 Tunnel compression ratio (uplink): 9.57609 Tunnel compression ratio (downlink): 3.18539 Network bytes per CPU second: 6203 Tunnel bytes per CPU second: 1415 2016-04-16 13:33:12 ----- OpenVPN Stop ----- 2016-04-16 13:33:15 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:33:15 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [rcvbuf] [262144] 13 [sndbuf] [262144] 2016-04-16 13:33:15 EVENT: RESOLVE 2016-04-16 13:33:15 LZO-ASYM init swap=0 asym=1 2016-04-16 13:33:15 Comp-stub init swap=0 2016-04-16 13:33:15 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:33:15 EVENT: WAIT 2016-04-16 13:33:15 SetTunnelSocket returned 1 2016-04-16 13:33:15 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:33:15 EVENT: CONNECTING 2016-04-16 13:33:15 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:33:15 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:33:16 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:33:16 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:33:39 EVENT: DISCONNECTED 2016-04-16 13:33:39 Raw stats on disconnect: BYTES_IN : 4572 BYTES_OUT : 3982 PACKETS_IN : 10 PACKETS_OUT : 12 REPLAY_ERROR : 1 PKTID_TCP_OUT_OF_SEQ : 1 2016-04-16 13:33:39 Performance stats on disconnect: CPU usage (microseconds): 2057027 Network bytes per CPU second: 4158 Tunnel bytes per CPU second: 0 2016-04-16 13:33:39 ----- OpenVPN Stop ----- 2016-04-16 13:33:42 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:33:42 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 2016-04-16 13:33:42 EVENT: RESOLVE 2016-04-16 13:33:42 LZO-ASYM init swap=0 asym=1 2016-04-16 13:33:42 Comp-stub init swap=0 2016-04-16 13:33:42 Contacting 149.255.33.154:80 via TCP 2016-04-16 13:33:42 EVENT: WAIT 2016-04-16 13:33:42 SetTunnelSocket returned 1 2016-04-16 13:33:42 Connecting to 149.255.33.154:80 (149.255.33.154) via TCPv4 2016-04-16 13:33:42 EVENT: CONNECTING 2016-04-16 13:33:42 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:33:42 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:33:42 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:33:42 VERIFY OK: depth=0 cert. version : 3 serial number : 44 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:44:55 expires on : 2024-04-08 10:44:55 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:33:45 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 13:33:45 Session is ACTIVE 2016-04-16 13:33:45 EVENT: GET_CONFIG 2016-04-16 13:33:45 Sending PUSH_REQUEST to server... 2016-04-16 13:33:46 Sending PUSH_REQUEST to server... 2016-04-16 13:33:46 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.7.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.7.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.7.0.152] [255.255.0.0] 2016-04-16 13:33:46 LZO-ASYM init swap=0 asym=1 2016-04-16 13:33:46 Comp-stub init swap=0 2016-04-16 13:33:46 EVENT: ASSIGN_IP 2016-04-16 13:33:46 TunPersist: saving tun context: Session Name: 149.255.33.154 Remote Address: 149.255.33.154 Tunnel Addresses: 10.7.0.152/16 -> 10.7.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.7.0.1 Search Domains: 2016-04-16 13:33:46 Connected via tun 2016-04-16 13:33:46 EVENT: CONNECTED @149.255.33.154:80 (149.255.33.154) via /TCPv4 on tun/10.7.0.152/ 2016-04-16 13:33:46 SetStatus Connected 2016-04-16 13:34:31 TUN reset routes 2016-04-16 13:34:31 EVENT: DISCONNECTED 2016-04-16 13:34:31 Raw stats on disconnect: BYTES_IN : 58173 BYTES_OUT : 198560 PACKETS_IN : 172 PACKETS_OUT : 270 TUN_BYTES_IN : 181315 TUN_BYTES_OUT : 44570 TUN_PACKETS_IN : 255 TUN_PACKETS_OUT : 185 2016-04-16 13:34:31 Performance stats on disconnect: CPU usage (microseconds): 2194768 Tunnel compression ratio (uplink): 1.09511 Tunnel compression ratio (downlink): 1.30521 Network bytes per CPU second: 116975 Tunnel bytes per CPU second: 102919 2016-04-16 13:34:31 ----- OpenVPN Stop ----- 2016-04-16 13:34:38 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:34:38 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [rcvbuf] [262144] 13 [sndbuf] [262144] 2016-04-16 13:34:38 EVENT: RESOLVE 2016-04-16 13:34:38 LZO-ASYM init swap=0 asym=1 2016-04-16 13:34:38 Comp-stub init swap=0 2016-04-16 13:34:38 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:34:38 EVENT: WAIT 2016-04-16 13:34:38 SetTunnelSocket returned 1 2016-04-16 13:34:39 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:34:41 EVENT: CONNECTING 2016-04-16 13:34:41 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:34:41 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:35:21 Session invalidated: KEEPALIVE_TIMEOUT 2016-04-16 13:35:21 Client terminated, restarting in 2... 2016-04-16 13:35:23 EVENT: RECONNECTING 2016-04-16 13:35:23 LZO-ASYM init swap=0 asym=1 2016-04-16 13:35:23 Comp-stub init swap=0 2016-04-16 13:35:23 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:35:23 EVENT: WAIT 2016-04-16 13:35:23 SetTunnelSocket returned 1 2016-04-16 13:35:24 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:35:27 EVENT: CONNECTING 2016-04-16 13:35:27 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:35:27 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:35:43 NET Internet:NotReachable/-- ------- 2016-04-16 13:35:43 NET WiFi:NotReachable/-- ------- 2016-04-16 13:35:46 NET WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:35:46 NET Internet:ReachableViaWiFi/-R ------- 2016-04-16 13:35:49 EVENT: DISCONNECTED 2016-04-16 13:35:49 Raw stats on disconnect: BYTES_IN : 7716 BYTES_OUT : 956 PACKETS_IN : 10 PACKETS_OUT : 16 REPLAY_ERROR : 10 KEEPALIVE_TIMEOUT : 1 N_RECONNECT : 1 PKTID_TCP_OUT_OF_SEQ : 10 2016-04-16 13:35:49 Performance stats on disconnect: CPU usage (microseconds): 48584 Network bytes per CPU second: 178494 Tunnel bytes per CPU second: 0 2016-04-16 13:35:49 ----- OpenVPN Stop ----- 2016-04-16 13:35:50 ----- OpenVPN Start ----- OpenVPN core 3.0 ios armv7s thumb2 32-bit 2016-04-16 13:35:50 UNUSED OPTIONS 4 [resolv-retry] [infinite] 5 [nobind] 6 [persist-key] 7 [persist-tun] 11 [verb] [3] 12 [rcvbuf] [262144] 13 [sndbuf] [262144] 2016-04-16 13:35:50 EVENT: RESOLVE 2016-04-16 13:35:50 LZO-ASYM init swap=0 asym=1 2016-04-16 13:35:50 Comp-stub init swap=0 2016-04-16 13:35:50 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:35:50 EVENT: WAIT 2016-04-16 13:35:50 SetTunnelSocket returned 1 2016-04-16 13:35:50 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:35:50 EVENT: CONNECTING 2016-04-16 13:35:50 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:35:50 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:35:51 VERIFY OK: depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true 2016-04-16 13:35:51 VERIFY OK: depth=0 cert. version : 3 serial number : 50 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org issued on : 2014-04-11 10:45:56 expires on : 2024-04-08 10:45:56 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication 2016-04-16 13:35:53 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2016-04-16 13:35:53 Session is ACTIVE 2016-04-16 13:35:53 EVENT: GET_CONFIG 2016-04-16 13:35:53 Sending PUSH_REQUEST to server... 2016-04-16 13:35:54 OPTIONS: 0 [redirect-gateway] [def1] [bypass-dhcp] 1 [dhcp-option] [DNS] [10.5.0.1] 2 [comp-lzo] [no] 3 [route-gateway] [10.5.0.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.5.3.75] [255.255.0.0] 2016-04-16 13:35:54 LZO-ASYM init swap=0 asym=1 2016-04-16 13:35:54 Comp-stub init swap=0 2016-04-16 13:35:54 EVENT: ASSIGN_IP 2016-04-16 13:35:54 TunPersist: saving tun context: Session Name: 46.165.208.65 Remote Address: 46.165.208.65 Tunnel Addresses: 10.5.3.75/16 -> 10.5.0.1 Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.5.0.1 Search Domains: 2016-04-16 13:35:54 Connected via tun 2016-04-16 13:35:54 EVENT: CONNECTED @46.165.208.65:443 (46.165.208.65) via /TCPv4 on tun/10.5.3.75/ 2016-04-16 13:35:54 SetStatus Connected 2016-04-16 13:38:59 OS Event: NET AVAILABLE (RESUME): Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:39:00 OS Event: NET AVAILABLE (RESUME): Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:39:03 OS Event: NET AVAILABLE (RESUME): Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:39:06 RECONNECT TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:39:06 EVENT: PAUSE 2016-04-16 13:39:07 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:39:07 EVENT: RESUME 2016-04-16 13:39:07 EVENT: RECONNECTING 2016-04-16 13:39:07 LZO-ASYM init swap=0 asym=1 2016-04-16 13:39:07 Comp-stub init swap=0 2016-04-16 13:39:07 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:39:07 EVENT: WAIT 2016-04-16 13:39:07 SetTunnelSocket returned 1 2016-04-16 13:39:08 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:39:11 EVENT: CONNECTING 2016-04-16 13:39:11 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:39:11 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:39:16 OS Event: SLEEP 2016-04-16 13:39:16 EVENT: PAUSE 2016-04-16 13:39:20 OS Event: WAKEUP 2016-04-16 13:39:23 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:39:23 EVENT: RESUME 2016-04-16 13:39:23 EVENT: RECONNECTING 2016-04-16 13:39:23 LZO-ASYM init swap=0 asym=1 2016-04-16 13:39:23 Comp-stub init swap=0 2016-04-16 13:39:23 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:39:23 EVENT: WAIT 2016-04-16 13:39:23 SetTunnelSocket returned 1 2016-04-16 13:39:24 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:39:26 EVENT: CONNECTING 2016-04-16 13:39:26 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:39:26 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1 2016-04-16 13:39:58 OS Event: SLEEP 2016-04-16 13:39:58 EVENT: PAUSE 2016-04-16 13:40:01 OS Event: WAKEUP 2016-04-16 13:40:04 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:40:04 EVENT: RESUME 2016-04-16 13:40:04 EVENT: RECONNECTING 2016-04-16 13:40:04 LZO-ASYM init swap=0 asym=1 2016-04-16 13:40:04 Comp-stub init swap=0 2016-04-16 13:40:04 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:40:04 EVENT: WAIT 2016-04-16 13:40:04 SetTunnelSocket returned 1 2016-04-16 13:40:06 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:40:06 OS Event: SLEEP 2016-04-16 13:40:06 EVENT: PAUSE 2016-04-16 13:44:12 OS Event: WAKEUP 2016-04-16 13:44:15 RESUME TEST: Internet:ReachableViaWiFi/-R ------- WiFi:ReachableViaWiFi/-R ------d 2016-04-16 13:44:15 EVENT: RESUME 2016-04-16 13:44:15 EVENT: RECONNECTING 2016-04-16 13:44:15 LZO-ASYM init swap=0 asym=1 2016-04-16 13:44:15 Comp-stub init swap=0 2016-04-16 13:44:15 Contacting 46.165.208.65:443 via TCP 2016-04-16 13:44:15 EVENT: WAIT 2016-04-16 13:44:15 SetTunnelSocket returned 1 2016-04-16 13:44:16 Connecting to 46.165.208.65:443 (46.165.208.65) via TCPv4 2016-04-16 13:44:21 EVENT: CONNECTING 2016-04-16 13:44:21 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2016-04-16 13:44:21 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177 IV_VER=3.0 IV_PLAT=ios IV_NCP=1 IV_SNAPPY=1 IV_LZO=1 IV_LZO_SWAP=1 IV_LZ4=1 IV_COMP_STUB=1