Jump to content
Not connected, Your IP: 18.191.132.194

LZ1

Members2
  • Content Count

    2089
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    78

Everything posted by LZ1

  1. No worries. You can still get green, but did you check the HTTP code? It's the HTTP code which indicates if there's real access or not.
  2. Hello! I'm able to access it. I suggest you try the route checking tool if you want to see which locations are likely blocked . You may also refer to the guide in my signature if you're uncertain how.
  3. You're welcome. I should say there's little need for that though, as Network Lock also protects you from WebRTC leaks. If you worry so much about DNS leaks, I would also urge you to consider switching to Linux, as there's no DNS leaks on Linux . Because Windows does DNS in a strange way compared to it. Lastly, I would also urge you to consider trying out the experimental client if you wish, in case you want a headstart on new features and bugfixes. It's not dangerous .
  4. Hello! I recommend checking this Staff FAQ post if you didn't already. Note the warning. Secondly, it would be helpful if you tell us why you're portforwarding, as you're perhaps doing more than necessary. As Zhang suggested, you can test the assigned ports ability to reach you, in his link. If the port number isn't crucial, you can simply "Add" in the Client Area ports section and the system will automatically assign you an available port. As Zhang also suggested, the port number you pick, needs to be put into whichever program you're wanting to use, such as a torrent client. So that something is "listening" on the assigned port, for a connection. Both .org and .info are the same, but .info is used as a back up in case .org is blocked, such as by an ISP. If you start on .org and end up on .info, it may thus require you to login anew .
  5. Hello! It's not clear if you followed this guide or not, but hopefully it's helpful. I think you may have set the wrong DNS.
  6. Welcome to the club. You may find many of your questions already answered, in the link in my signature. Enjoy the ride .
  7. Well said. I just think it's cynical how it can create an association between tools which should help people stay more secure, with the exact opposite, of insecurity . But you're right it's quite a smart thing for them to do in many ways.
  8. I understand it's frustrating and ideally, there would be no wait at all, naturally. But I'm confident that if you get past this, you'll come to see Air support as quite a lot better than your current impression . Especially when it comes to technical questions. Air is also a small company, so there's that. But perhaps that's a good suggestion. If you feel they would benefit to suggest what their business times are, then you can submit a support ticket to the "Feedback" department all the same.
  9. Hello! Welcome! You need to remember that the Air support team follows an Italian timezone. So depending on where you are, you may need to wait a while. Otherwise there's plenty of people who stumbled into payment issues. In cases regarding PayPayl for example, it may be better to contact them, rather than Air. You can also go to the Client Area, to see your invoices. Please just be patient .
  10. Hello! It is possible and common. Air allows 5 connections per account, so you could install Eddie on the 2nd PC too; if you can install Eddie and create a hotspot, you could also connect your phones to that hotspot and their traffic would go through Air as well. But if as you say this is neither enough nor satisfactory, such as if you don't want to install a client on mobile, then you can use a router to do the job. Then you can also connect more than 5 items. You need a router with a good CPU, supported by any router software you want to use such as DD-WRT and ideally support for AES-NI. Since most consumer routers are quite weak, that's the reason you probably heard the marketing term "VPN router", as some routers are more suitable than others. But in principle, any computer can be turned into a router, with the right software, such as pfSense. If you're ambitious, you could consider a Turris Omnia, which has superior router hardware to consumer routers. You need a router with decent hardware and software so if you want good performance, then yes you need it.
  11. Hello! I thought this piece of news was interesting and it underscores that it's important to look at who owns what and to read the terms, not just look at technical features or marketing text. It seems quite cynical for FB to run this thing.
  12. Got 2.14.1. Linux Mint 18 Cinnamon. Bug. Minimize to tray is creating dead "Hide Main Window" links both within Eddie and on its tray icon. I'll try use bullet points, to hopefully make it less confusing. "Show Try Icon" & "Minimize to tray" are on by default. By turning off the 2nd one, you can minimize Eddie, but the tray icon shortcut won't show a "Show Main Window" option anymore, but only a "Hide Main Window", despite the window already being hidden.Clicking this "Hide Main Window" menu item does nothing, as the window is already hidden.Meanwhile, the option for hiding the window IN the client, is gone. So one has to click the little dash in the top right corner to minimize. If you then ALSO turn off "Show Tray Icon", Eddies tray icon won't show the "Hide Window" option anymore.But the Eddie tray icon itself remains unchanged, so I don't see the point. IF I then turn "Show Tray Icon" back on, nothing changes and the "Hide Main Window" option is still hidden.If I then also turn on "Minimize to Tray", then the bug from before persists, where it requires you to minimize Eddie 1 time, before the Hide/Show options come back to default in the client and tray icon.I also wasn't able to connect to Castor. Including with TCP and IP6 only enabled. But I'm glad the no-bootstrap error & memory leak is apparently fixed, because I got a huge amount of popups each time I turned on my PC. Bug? The entire server list is red, so I can't connect to them by clicking. But if I click connect automatically, Eddie will connect. Including to servers which were otherwise red. They all say "NA: No IP6 exit available". My settings: Preferences>Networking>Both Layer IP4 and IP6 are set to "Inside tunnel(must be supported)".IP protocol used for connection: IP4 only. All others Automatic.I'm not leaking on Ipleak, despite not being able to select locations myself.Bug. When the location list is all red as describe before, opening preferences and then changing the position of the window, so that you can see the location list, shows the list as white like normal, instead of red. Which could probably be confusing if you're changing settings and trying to see if the color changes or not . Sorry for adding more to your workload Clodo and co, when you likely weren't finished with my prior logs, haha. Good effort guys!
  13. Hello! If you go to the New User guide in my signature and then head to the guides section, you can find a guide to disable that. With the mandatory attached security warning that doesn't recommend it . I was in the same position as you once and thought the same. But I was persuaded not to do it, as it's not good for security and ultimately only a small extra step.
  14. If you're using Eddie's Network Lock you won't be leaking and you would always be able to check on ipleak.net in any case . Airs Eddie program is an OpenVPN wrapper in itself essentially and Air only uses this protocol.
  15. I don't think you need to worry. Eddie 3x is the big milestone to wait for and that's the intended time for really "letting Eddie go" I think. I think he's saying they're testing how it would work with multiple support and so that feature is the precursor to the big rollout. But it'll then become redundant as we near Eddie 3x. I also think they're toying with the idea of an Android client, soooooooo don't worry . I think they can see there's lots of support for it and I for one hope they do it if they can, because the other solutions are clumsy in my opinion. With all due respect to the many people who work on those other projects . @Clodo No stress haha, good effort. As I said, I hope you don't get a headache!
  16. You may be able to enable logging in Preferences>Logging.
  17. Hello! It's all running smoothly on Mint 18 Cinnamon. Well mostly, until I destroyed it haha. Really wanted to say excellent work done there Clodo and co. It's looking really great. What is the "Experimentals" tab for though? Currently totally blank for me, with nothing clickable at all. User experience. Also, have you considered directing people here instead of here, when they click the web shortcut for port-forwarding? Because: 1 - The link on top of the port-forwarding link, goes to the client area anyway and from there it's easy to find the ports tab. 2 - Those who click the link presumably don't know how port-forwarding works and so therefore your explanation, which includes a security warning, is important and relevant. 3 - Many people don't see those Staff FAQs which they need, because there's many of them. So a direct link to them, might be useful. 4 - When you open Eddie up for more providers, it will be impossible to direct people to the client area I assume unless they're logged in. While the Staff FAQ is open and useful in all contexts. (The Staff FAQ could include a link to the client area too) User experience. In Preferences>Advanced> the link to the Advanced Features FAQ is missing a description for the two new options "Skip Process checking" and "Multiple provider support" respectively. User experience. I feel like the client could really use some more mouse-over description text. Such as in the Server tab for instance, where there's a couple of buttons in the right-hand margin whose functions aren't too clear. I don't know what the button on top of the 3 black dots does for example and as it's greyed out, I can't click it to try either. While the circular arrows at the bottom reset all the location preferences it seems, which means people could then be connecting to places they don't want to connect, as it wipes the white/blacklists. Maybe a dialogue box should at least appear for that button, to confirm that action. Functionality. In the "Protocols" section, in the top right corner, it says "30 protocol modes not available due to your OpenVPN version". Is this to do with tls-crypt or such? (As one of the prior posters using Windows, who got duplicate protocol entries. He gets duplicates, while I get none.) So which version should I have? I would expect to get the latest one, upon download of the new client. I'm using: OpenVPN: 2.3.10 - OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08. All the usual protocols seem to be there as well and in working order. Functionality. I noticed that when I go to Preferences>General> check "Minimize to tray" and minimize Eddie and then click the Eddie tray icon, there's an option to display the main window. But if I uncheck "Minimize to tray" and repeat the process, then there's no option to "display main window", including if Eddie still gets minimized to the tray anyway. Instead, one has to click "Connected", to bring up the main window. If I then disconnect first, then there's more options in the tray icon while "Minimize to tray" is not checked: "Connect to a recommended server" and "Session terminated" and I need to click "Session terminated" to bring up the main window in that case, which doesn't make sense to me. This seems inconsistent, as I expect the option to show/hide the main window to always be there, regardless of "Minimize to tray" is checked or not . Further, changes to that tray UI menu as well as the Eddie menu in general, don't take effect until Eddie is minimized 1 time, which seems odd. This is despite checking/unchecking both "Show Tray Icon" and "Minimize to tray" and saving. It's not a huge deal, but just something I noticed. Functionality. In Stats, double clicking Discovery stats doesn't seem to do anything at all, whether connected or disconnected. I'm not sure if that's intended. Typo. In the Preferences>Logging there's a clear typo in the description text: "For multiple logs with different paths, separe it with a semicolon;" it should be "separate them". Typo. Small things which need fixing include the About page "Website" and "Manual" links, which when clicked redirect to completely different URLs from the ones displayed. Typo. In Preferences>OVPN directives>bottom drop-down box on the right which says "Append Custom directives", there's an incomplete sentence description in the second option: "(...)ignore Base, Provider and..." and what? Bug. In Preferences>Logging>Open in filemanager I first got an error pop-up about not being able to find the location or something. Is it intended that we first check the 2 logging boxes before trying to open the file manager? Because after I checked those boxes, browsed to the log file in my file manager outside of Eddie and then went back into Eddie to click the same "Open in filemanager" button again, it worked. But I initially got an error. Which seems odd, because it's not as if it's trying to open a non-existent logfile, which would be understandable. Instead, it's just trying to open the file manager and that should always be possible I thought. Bug. I was really mean to Eddie, so in Logs>Command line button in the bottom right corner, I put in a huge amount of text, special characters, numbers and also Chinese. Eddie posted it all to the log pretty well. Except it couldn't display the Chinese characters. On mouse-over this led to a hugely long line of preview text spanning my screen from edge to edge, haha. This wasn't an issue. But then I clicked the Lifebelt icon and rather ironically, that killed Eddie. Total crash. The UI froze completely and then disappeared. I restarted Eddie and he has had issues connecting now and for some reason, it seems to be DNS related and so I had to go to Preferences>DNS> and uncheck "Check Air DNS" to make it work. Interestingly, it appears Eddie did NOT take note of the crash like he normally does. Also, by re-checking "Check Air DNS", trying to connect to a location and then clicking the lifebelt icon, all of Eddie's UI freezes up completely. This also happens if I'm simply disconnected. I suppose it's because the lifebelt icon tries to run some tests and these aren't easy to do if things don't work. In the end the UI does spring back to life, but it's a significant freeze. All of this is with Network Lock ON and with Preferences>Networking>IP Protocol set to IP4; I later changed back to the default IP4, IP6 order. Here's the log from right after reconnecting again: . 2018.02.12 09:35:42 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:35:42 - OpenVPN > RTNETLINK answers: File exists E 2018.02.12 09:35:42 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2 . 2018.02.12 09:35:42 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:35:42 - OpenVPN > RTNETLINK answers: File exists E 2018.02.12 09:35:42 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2 . 2018.02.12 09:35:42 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 09:35:42 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:35:42 - Routes, added a new route, 213.152.161.181 for gateway 10.4.0.1 . 2018.02.12 09:35:42 - Flushing DNS I 2018.02.12 09:35:43 - Checking route IPv4 . 2018.02.12 09:36:03 - curl: (28) Connection timed out after 20001 milliseconds . 2018.02.12 09:36:03 - Checking route (2° try) . 2018.02.12 09:36:24 - curl: (28) Connection timed out after 20001 milliseconds . 2018.02.12 09:36:24 - Checking route (3° try) . 2018.02.12 09:36:46 - curl: (28) Connection timed out after 20001 milliseconds E 2018.02.12 09:36:46 - Checking route IPv4 failed. . 2018.02.12 09:36:46 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:36:46 - Disconnecting . 2018.02.12 09:36:46 - Routes, removed a route previously added, 213.152.161.181 for gateway 10.4.0.1 . 2018.02.12 09:36:46 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2018.02.12 09:36:46 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2018.02.12 09:36:46 - OpenVPN > Restart pause, 2 second(s) . 2018.02.12 09:36:46 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 09:36:46 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 09:36:46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.180:443 . 2018.02.12 09:36:46 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=d53b22bc e6aebd7b . 2018.02.12 09:36:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 09:36:46 - OpenVPN > Validating certificate key usage . 2018.02.12 09:36:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 09:36:46 - OpenVPN > VERIFY KU OK . 2018.02.12 09:36:46 - OpenVPN > Validating certificate extended key usage . 2018.02.12 09:36:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 09:36:46 - OpenVPN > VERIFY EKU OK . 2018.02.12 09:36:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 09:36:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:36:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:36:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:36:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:36:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 09:36:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443 . 2018.02.12 09:36:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 09:36:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.159 255.255.0.0' . 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 09:36:46 - OpenVPN > Preserving previous TUN/TAP instance: tun1 . 2018.02.12 09:36:46 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:36:46 - Routes, added a new route, 213.152.161.181 for gateway 10.4.0.1 . 2018.02.12 09:36:46 - Flushing DNS . 2018.02.12 09:36:47 - OpenVPN > Initialization Sequence Completed . 2018.02.12 09:36:47 - Sending management termination signal . 2018.02.12 09:36:47 - Management - Send 'signal SIGTERM' . 2018.02.12 09:36:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 09:36:47 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 09:36:53 - OpenVPN > /sbin/ip route del 213.152.161.180/32 . 2018.02.12 09:36:53 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 09:36:53 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 09:36:53 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 09:36:53 - OpenVPN > /sbin/ip addr del dev tun1 10.4.59.159/16 . 2018.02.12 09:36:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 09:36:53 - Connection terminated. . 2018.02.12 09:36:53 - DNS of the system restored to original settings (Rename method) I 2018.02.12 09:36:56 - Checking authorization ... ! 2018.02.12 09:36:57 - Connecting to Alchiba (Netherlands, Alblasserdam) . 2018.02.12 09:36:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 09:36:57 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 09:36:57 - Connection to OpenVPN Management Interface . 2018.02.12 09:36:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 09:36:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 09:36:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:36:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:36:57 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 09:36:57 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 09:36:57 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.180:443 . 2018.02.12 09:36:57 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=927ae511 cd35ffee . 2018.02.12 09:36:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 09:36:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 09:36:58 - OpenVPN > Validating certificate key usage . 2018.02.12 09:36:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 09:36:58 - OpenVPN > VERIFY KU OK . 2018.02.12 09:36:58 - OpenVPN > Validating certificate extended key usage . 2018.02.12 09:36:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 09:36:58 - OpenVPN > VERIFY EKU OK . 2018.02.12 09:36:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 09:36:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:36:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:36:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:36:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:36:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 09:36:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443 . 2018.02.12 09:37:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 09:37:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.159 255.255.0.0' . 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 09:37:01 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 09:37:01 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 09:37:01 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 09:37:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 09:37:01 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 09:37:01 - OpenVPN > /sbin/ip addr add dev tun1 10.4.59.159/16 broadcast 10.4.255.255 . 2018.02.12 09:37:07 - OpenVPN > /sbin/ip route add 213.152.161.180/32 via 192.168.43.1 . 2018.02.12 09:37:07 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:37:07 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:37:07 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 09:37:07 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:37:07 - Routes, added a new route, 213.152.161.181 for gateway 10.4.0.1 . 2018.02.12 09:37:07 - Flushing DNS I 2018.02.12 09:37:07 - Checking route IPv4 I 2018.02.12 09:37:10 - Checking DNS . 2018.02.12 09:37:11 - Checking DNS failed: riwdibebhwrpjmhnnfzegchubitzkymw . 2018.02.12 09:37:11 - Checking DNS (2° try) . 2018.02.12 09:37:13 - Checking DNS failed: riwdibebhwrpjmhnnfzegchubitzkymw . 2018.02.12 09:37:13 - Checking DNS (3° try) . 2018.02.12 09:37:18 - Checking DNS failed: riwdibebhwrpjmhnnfzegchubitzkymw E 2018.02.12 09:37:18 - Checking DNS failed. . 2018.02.12 09:37:18 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:37:18 - Disconnecting Bug. Following on from the last issue, I tried letting "Check Air DNS" remain checked. Then I unchecked "Check if Tunnel works" and I got different DNS error text strings. I'm attaching them in case they mean something to you. In the second half, I disabled Network Lock and tried to reconnect and the DNS text string is again different. In the 3rd and final example, I reset all settings back to their default; although Network Lock stayed on, interestingly. Worryingly, this still didn't fix the issue and the text strings were yet again different. Oddly, after the third attempt and the reset, I clicked the grey X in the top right corner of Eddie to quit and I confirmed it in the pop-up. When I restarted Eddie, it then took that as an unexpected crash and at this point, NL was finally disabled. Shouldn't NL & the white/black lists also disable/reset the first time things are reset? If you need a lifebelt report, then just ask and I'll send it to you . I 2018.02.12 09:56:36 - Checking DNS . 2018.02.12 09:56:38 - Checking DNS failed: ontewymkunxmmibtmujydomlovjcigwp . 2018.02.12 09:56:38 - Checking DNS (2° try) . 2018.02.12 09:56:40 - Checking DNS failed: ontewymkunxmmibtmujydomlovjcigwp . 2018.02.12 09:56:40 - Checking DNS (3° try) . 2018.02.12 09:56:43 - Checking DNS failed: ontewymkunxmmibtmujydomlovjcigwp E 2018.02.12 09:56:43 - Checking DNS failed. . 2018.02.12 09:56:43 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:56:43 - Disconnecting . 2018.02.12 09:56:43 - Routes, removed a route previously added, 213.152.161.74 for gateway 10.4.0.1 . 2018.02.12 09:56:43 - Sending management termination signal . 2018.02.12 09:56:43 - Management - Send 'signal SIGTERM' . 2018.02.12 09:56:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 09:56:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 09:56:48 - OpenVPN > /sbin/ip route del 213.152.161.73/32 . 2018.02.12 09:56:49 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 09:56:49 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 09:56:49 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 09:56:49 - OpenVPN > /sbin/ip addr del dev tun1 10.4.59.242/16 . 2018.02.12 09:56:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 09:56:49 - Connection terminated. . 2018.02.12 09:56:49 - DNS of the system restored to original settings (Rename method) I 2018.02.12 09:56:52 - Checking authorization ... ! 2018.02.12 09:56:52 - Connecting to Algorab (Sweden, Uppsala) . 2018.02.12 09:56:52 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 09:56:52 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 09:56:52 - Connection to OpenVPN Management Interface . 2018.02.12 09:56:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 09:56:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 09:56:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:56:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:56:52 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 09:56:52 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 09:56:52 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.147:443 . 2018.02.12 09:56:52 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=4acba5b2 181fdc8d . 2018.02.12 09:56:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 09:56:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 09:56:52 - OpenVPN > Validating certificate key usage . 2018.02.12 09:56:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 09:56:52 - OpenVPN > VERIFY KU OK . 2018.02.12 09:56:52 - OpenVPN > Validating certificate extended key usage . 2018.02.12 09:56:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 09:56:52 - OpenVPN > VERIFY EKU OK . 2018.02.12 09:56:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 09:56:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:56:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:56:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:56:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:56:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 09:56:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443 . 2018.02.12 09:56:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 09:56:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.108 255.255.0.0,peer-id 8' . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 09:56:55 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 09:56:55 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 09:56:55 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 09:56:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 09:56:55 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 09:56:55 - OpenVPN > /sbin/ip addr add dev tun1 10.4.6.108/16 broadcast 10.4.255.255 . 2018.02.12 09:57:00 - OpenVPN > /sbin/ip route add 62.102.148.147/32 via 192.168.43.1 . 2018.02.12 09:57:00 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:57:00 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:57:00 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 09:57:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:57:00 - Routes, added a new route, 62.102.148.166 for gateway 10.4.0.1 . 2018.02.12 09:57:00 - Flushing DNS I 2018.02.12 09:57:01 - Checking DNS . 2018.02.12 09:57:03 - Checking DNS failed: . 2018.02.12 09:57:03 - Checking DNS (2° try) . 2018.02.12 09:57:05 - Checking DNS failed: . 2018.02.12 09:57:05 - Checking DNS (3° try) . 2018.02.12 09:57:10 - Checking DNS failed: E 2018.02.12 09:57:10 - Checking DNS failed. . 2018.02.12 09:57:10 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:57:10 - Disconnecting . 2018.02.12 09:57:10 - Routes, removed a route previously added, 62.102.148.166 for gateway 10.4.0.1 . 2018.02.12 09:57:10 - Sending management termination signal . 2018.02.12 09:57:10 - Management - Send 'signal SIGTERM' . 2018.02.12 09:57:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 09:57:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 09:57:15 - OpenVPN > /sbin/ip route del 62.102.148.147/32 . 2018.02.12 09:57:15 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 09:57:15 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 09:57:15 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 09:57:15 - OpenVPN > /sbin/ip addr del dev tun1 10.4.6.108/16 . 2018.02.12 09:57:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 09:57:15 - Connection terminated. . 2018.02.12 09:57:15 - DNS of the system restored to original settings (Rename method) I 2018.02.12 09:57:18 - Checking authorization ... ! 2018.02.12 09:57:20 - Connecting to Tarazed (Netherlands, Alblasserdam) . 2018.02.12 09:57:20 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 09:57:20 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 09:57:20 - Connection to OpenVPN Management Interface . 2018.02.12 09:57:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 09:57:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 09:57:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:20 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 09:57:20 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 09:57:20 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.132:443 . 2018.02.12 09:57:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 09:57:20 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.132:443, sid=572b5ace 62223cd0 . 2018.02.12 09:57:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 09:57:20 - OpenVPN > Validating certificate key usage . 2018.02.12 09:57:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 09:57:20 - OpenVPN > VERIFY KU OK . 2018.02.12 09:57:20 - OpenVPN > Validating certificate extended key usage . 2018.02.12 09:57:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 09:57:20 - OpenVPN > VERIFY EKU OK . 2018.02.12 09:57:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tarazed, emailAddress=info@airvpn.org . 2018.02.12 09:57:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:57:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:57:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 09:57:21 - OpenVPN > [Tarazed] Peer Connection Initiated with [AF_INET]213.152.161.132:443 . 2018.02.12 09:57:23 - OpenVPN > SENT CONTROL [Tarazed]: 'PUSH_REQUEST' (status=1) . 2018.02.12 09:57:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.26.186 255.255.0.0,peer-id 19' . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 09:57:24 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 09:57:24 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 09:57:24 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 09:57:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 09:57:24 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 09:57:24 - OpenVPN > /sbin/ip addr add dev tun1 10.4.26.186/16 broadcast 10.4.255.255 . 2018.02.12 09:57:29 - OpenVPN > /sbin/ip route add 213.152.161.132/32 via 192.168.43.1 . 2018.02.12 09:57:29 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:57:29 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:57:29 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 09:57:29 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:57:29 - Routes, added a new route, 213.152.161.133 for gateway 10.4.0.1 . 2018.02.12 09:57:29 - Flushing DNS I 2018.02.12 09:57:30 - Checking DNS . 2018.02.12 09:57:33 - Checking DNS failed: . 2018.02.12 09:57:33 - Checking DNS (2° try) . 2018.02.12 09:57:35 - Checking DNS failed: . 2018.02.12 09:57:35 - Checking DNS (3° try) . 2018.02.12 09:57:39 - Checking DNS failed: E 2018.02.12 09:57:39 - Checking DNS failed. . 2018.02.12 09:57:39 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:57:39 - Disconnecting . 2018.02.12 09:57:39 - Routes, removed a route previously added, 213.152.161.133 for gateway 10.4.0.1 . 2018.02.12 09:57:39 - Sending management termination signal . 2018.02.12 09:57:39 - Management - Send 'signal SIGTERM' . 2018.02.12 09:57:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 09:57:39 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 09:57:44 - OpenVPN > /sbin/ip route del 213.152.161.132/32 . 2018.02.12 09:57:44 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 09:57:44 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 09:57:44 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 09:57:44 - OpenVPN > /sbin/ip addr del dev tun1 10.4.26.186/16 . 2018.02.12 09:57:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 09:57:44 - Connection terminated. . 2018.02.12 09:57:44 - DNS of the system restored to original settings (Rename method) I 2018.02.12 09:57:47 - Checking authorization ... ! 2018.02.12 09:57:48 - Connecting to Benetnasch (Sweden, Uppsala) . 2018.02.12 09:57:48 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 09:57:48 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 09:57:48 - Connection to OpenVPN Management Interface . 2018.02.12 09:57:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 09:57:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 09:57:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:48 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 09:57:48 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 09:57:48 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.148:443 . 2018.02.12 09:57:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 09:57:48 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.148:443, sid=bed00778 b2f75ec0 . 2018.02.12 09:57:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 09:57:49 - OpenVPN > Validating certificate key usage . 2018.02.12 09:57:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 09:57:49 - OpenVPN > VERIFY KU OK . 2018.02.12 09:57:49 - OpenVPN > Validating certificate extended key usage . 2018.02.12 09:57:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 09:57:49 - OpenVPN > VERIFY EKU OK . 2018.02.12 09:57:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 09:57:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:57:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:57:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:57:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 09:57:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.148:443 . 2018.02.12 09:57:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 09:57:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.216 255.255.0.0,peer-id 9' . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 09:57:53 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 09:57:53 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 09:57:53 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 09:57:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 09:57:53 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 09:57:53 - OpenVPN > /sbin/ip addr add dev tun1 10.4.12.216/16 broadcast 10.4.255.255 . 2018.02.12 09:57:58 - OpenVPN > /sbin/ip route add 62.102.148.148/32 via 192.168.43.1 . 2018.02.12 09:57:58 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:57:58 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:57:58 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 09:57:58 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:57:58 - Routes, added a new route, 62.102.148.187 for gateway 10.4.0.1 . 2018.02.12 09:57:58 - Flushing DNS I 2018.02.12 09:57:59 - Checking DNS . 2018.02.12 09:58:01 - Checking DNS failed: . 2018.02.12 09:58:01 - Checking DNS (2° try) . 2018.02.12 09:58:04 - Checking DNS failed: . 2018.02.12 09:58:04 - Checking DNS (3° try) . 2018.02.12 09:58:08 - Checking DNS failed: E 2018.02.12 09:58:08 - Checking DNS failed. . 2018.02.12 09:58:08 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:58:08 - Disconnecting . 2018.02.12 09:58:08 - Routes, removed a route previously added, 62.102.148.187 for gateway 10.4.0.1 . 2018.02.12 09:58:08 - Sending management termination signal . 2018.02.12 09:58:08 - Management - Send 'signal SIGTERM' . 2018.02.12 09:58:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 09:58:08 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 09:58:13 - OpenVPN > /sbin/ip route del 62.102.148.148/32 . 2018.02.12 09:58:13 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 09:58:13 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 09:58:13 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 09:58:13 - OpenVPN > /sbin/ip addr del dev tun1 10.4.12.216/16 . 2018.02.12 09:58:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 09:58:13 - Connection terminated. . 2018.02.12 09:58:13 - DNS of the system restored to original settings (Rename method) I 2018.02.12 09:58:16 - Checking authorization ... ! 2018.02.12 09:58:18 - Connecting to Orion (Netherlands, Alblasserdam) . 2018.02.12 09:58:18 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 09:58:18 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 09:58:18 - Connection to OpenVPN Management Interface . 2018.02.12 09:58:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 09:58:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 09:58:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:18 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 09:58:18 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 09:58:18 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.238:443 . 2018.02.12 09:58:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 09:58:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=1d44526b 2a6f5041 . 2018.02.12 09:58:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 09:58:18 - OpenVPN > Validating certificate key usage . 2018.02.12 09:58:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 09:58:18 - OpenVPN > VERIFY KU OK . 2018.02.12 09:58:18 - OpenVPN > Validating certificate extended key usage . 2018.02.12 09:58:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 09:58:18 - OpenVPN > VERIFY EKU OK . 2018.02.12 09:58:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org . 2018.02.12 09:58:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:58:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:58:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 09:58:19 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443 . 2018.02.12 09:58:21 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1) . 2018.02.12 09:58:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.31.153 255.255.0.0,peer-id 17' . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 09:58:22 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 09:58:22 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 09:58:22 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 09:58:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 09:58:22 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 09:58:22 - OpenVPN > /sbin/ip addr add dev tun1 10.4.31.153/16 broadcast 10.4.255.255 . 2018.02.12 09:58:27 - OpenVPN > /sbin/ip route add 213.152.161.238/32 via 192.168.43.1 . 2018.02.12 09:58:27 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:58:27 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:58:27 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 09:58:27 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:58:27 - Routes, added a new route, 213.152.161.239 for gateway 10.4.0.1 . 2018.02.12 09:58:27 - Flushing DNS I 2018.02.12 09:58:28 - Checking DNS . 2018.02.12 09:58:30 - Checking DNS failed: . 2018.02.12 09:58:30 - Checking DNS (2° try) . 2018.02.12 09:58:32 - Checking DNS failed: . 2018.02.12 09:58:32 - Checking DNS (3° try) . 2018.02.12 09:58:36 - Checking DNS failed: E 2018.02.12 09:58:36 - Checking DNS failed. . 2018.02.12 09:58:36 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:58:36 - Disconnecting . 2018.02.12 09:58:36 - Routes, removed a route previously added, 213.152.161.239 for gateway 10.4.0.1 . 2018.02.12 09:58:36 - Sending management termination signal . 2018.02.12 09:58:36 - Management - Send 'signal SIGTERM' . 2018.02.12 09:58:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 09:58:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 09:58:42 - OpenVPN > /sbin/ip route del 213.152.161.238/32 . 2018.02.12 09:58:42 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 09:58:42 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 09:58:42 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 09:58:42 - OpenVPN > /sbin/ip addr del dev tun1 10.4.31.153/16 . 2018.02.12 09:58:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 09:58:42 - Connection terminated. . 2018.02.12 09:58:42 - DNS of the system restored to original settings (Rename method) I 2018.02.12 09:58:45 - Checking authorization ... ! 2018.02.12 09:58:46 - Connecting to Situla (Netherlands, Alblasserdam) . 2018.02.12 09:58:46 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 09:58:46 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 09:58:46 - Connection to OpenVPN Management Interface . 2018.02.12 09:58:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 09:58:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 09:58:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:46 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 09:58:46 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 09:58:46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443 . 2018.02.12 09:58:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 09:58:47 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=77bcf6f5 7c29877a . 2018.02.12 09:58:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 09:58:47 - OpenVPN > Validating certificate key usage . 2018.02.12 09:58:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 09:58:47 - OpenVPN > VERIFY KU OK . 2018.02.12 09:58:47 - OpenVPN > Validating certificate extended key usage . 2018.02.12 09:58:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 09:58:47 - OpenVPN > VERIFY EKU OK . 2018.02.12 09:58:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 09:58:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:58:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 09:58:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 09:58:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 09:58:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443 . 2018.02.12 09:58:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 09:58:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.9 255.255.0.0' . 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 09:58:50 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 09:58:50 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 09:58:50 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 09:58:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 09:58:50 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 09:58:50 - OpenVPN > /sbin/ip addr add dev tun1 10.4.64.9/16 broadcast 10.4.255.255 . 2018.02.12 09:58:56 - OpenVPN > /sbin/ip route add 213.152.161.14/32 via 192.168.43.1 . 2018.02.12 09:58:56 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:58:56 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 09:58:56 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 09:58:56 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 09:58:56 - Routes, added a new route, 213.152.161.15 for gateway 10.4.0.1 . 2018.02.12 09:58:56 - Flushing DNS I 2018.02.12 09:58:56 - Checking DNS . 2018.02.12 09:58:58 - Checking DNS failed: xxocpcsmxcigqoesgfduknwzkxwwsqou . 2018.02.12 09:58:58 - Checking DNS (2° try) . 2018.02.12 09:59:00 - Checking DNS failed: xxocpcsmxcigqoesgfduknwzkxwwsqou . 2018.02.12 09:59:00 - Checking DNS (3° try) . 2018.02.12 09:59:05 - Checking DNS failed: xxocpcsmxcigqoesgfduknwzkxwwsqou E 2018.02.12 09:59:05 - Checking DNS failed. . 2018.02.12 09:59:05 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 09:59:05 - Disconnecting Second half: ! 2018.02.12 10:13:50 - Deactivation of Network Lock I 2018.02.12 10:13:55 - Session starting. W 2018.02.12 10:13:55 - The option 'Remove default gateway' will be deprecated soon. I 2018.02.12 10:13:55 - Checking authorization ... ! 2018.02.12 10:13:57 - Connecting to Hatysa (Sweden, Uppsala) . 2018.02.12 10:13:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:13:57 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:13:57 - Connection to OpenVPN Management Interface . 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:13:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:13:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:57 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:13:57 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:13:57 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443 . 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:13:57 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=50ba34e0 92d7e2de . 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:13:57 - OpenVPN > Validating certificate key usage . 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:13:57 - OpenVPN > VERIFY KU OK . 2018.02.12 10:13:57 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:13:57 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hatysa, emailAddress=info@airvpn.org . 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:13:58 - OpenVPN > [Hatysa] Peer Connection Initiated with [AF_INET]62.102.148.144:443 . 2018.02.12 10:14:00 - OpenVPN > SENT CONTROL [Hatysa]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:14:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.127 255.255.0.0,peer-id 13' . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:14:00 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:14:00 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:14:00 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:14:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:14:00 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:14:00 - OpenVPN > /sbin/ip addr add dev tun1 10.4.30.127/16 broadcast 10.4.255.255 . 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 62.102.148.144/32 via 192.168.43.1 . 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:05 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:14:05 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:14:05 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:05 - Routes, added a new route, 62.102.148.160 for gateway 10.4.0.1 . 2018.02.12 10:14:05 - Flushing DNS I 2018.02.12 10:14:06 - Checking DNS . 2018.02.12 10:14:07 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav . 2018.02.12 10:14:07 - Checking DNS (2° try) . 2018.02.12 10:14:10 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav . 2018.02.12 10:14:10 - Checking DNS (3° try) . 2018.02.12 10:14:13 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav E 2018.02.12 10:14:13 - Checking DNS failed. . 2018.02.12 10:14:13 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:14:13 - Disconnecting . 2018.02.12 10:14:13 - Routes, removed a route previously added, 62.102.148.160 for gateway 10.4.0.1 . 2018.02.12 10:14:13 - Sending management termination signal . 2018.02.12 10:14:13 - Management - Send 'signal SIGTERM' . 2018.02.12 10:14:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:14:13 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 62.102.148.144/32 . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:14:18 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip addr del dev tun1 10.4.30.127/16 . 2018.02.12 10:14:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:14:18 - Connection terminated. . 2018.02.12 10:14:18 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:18 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:14:21 - Checking authorization ... ! 2018.02.12 10:14:21 - Connecting to Nodus (Sweden, Uppsala) . 2018.02.12 10:14:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:14:21 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:14:21 - Connection to OpenVPN Management Interface . 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:14:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:14:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:21 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:14:21 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:14:21 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.133:443 . 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:14:21 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.133:443, sid=b67c45ce e1060fbb . 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:14:22 - OpenVPN > Validating certificate key usage . 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:14:22 - OpenVPN > VERIFY KU OK . 2018.02.12 10:14:22 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:14:22 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nodus, emailAddress=info@airvpn.org . 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:14:22 - OpenVPN > [Nodus] Peer Connection Initiated with [AF_INET]62.102.148.133:443 . 2018.02.12 10:14:24 - OpenVPN > SENT CONTROL [Nodus]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:14:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.163 255.255.0.0,peer-id 10' . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:14:24 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:14:24 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:14:24 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:14:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:14:24 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:14:24 - OpenVPN > /sbin/ip addr add dev tun1 10.4.4.163/16 broadcast 10.4.255.255 . 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 62.102.148.133/32 via 192.168.43.1 . 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:29 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:14:29 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:14:30 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:30 - Routes, added a new route, 62.102.148.181 for gateway 10.4.0.1 . 2018.02.12 10:14:30 - Flushing DNS I 2018.02.12 10:14:30 - Checking DNS . 2018.02.12 10:14:33 - Checking DNS failed: . 2018.02.12 10:14:33 - Checking DNS (2° try) . 2018.02.12 10:14:35 - Checking DNS failed: . 2018.02.12 10:14:35 - Checking DNS (3° try) . 2018.02.12 10:14:38 - Checking DNS failed: E 2018.02.12 10:14:38 - Checking DNS failed. . 2018.02.12 10:14:38 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:14:38 - Disconnecting . 2018.02.12 10:14:38 - Routes, removed a route previously added, 62.102.148.181 for gateway 10.4.0.1 . 2018.02.12 10:14:38 - Sending management termination signal . 2018.02.12 10:14:38 - Management - Send 'signal SIGTERM' . 2018.02.12 10:14:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:14:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 62.102.148.133/32 . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:14:43 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip addr del dev tun1 10.4.4.163/16 . 2018.02.12 10:14:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:14:43 - Connection terminated. . 2018.02.12 10:14:43 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:43 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:14:46 - Cancel requested. I 2018.02.12 10:14:46 - Session terminated. Final: ! 2018.02.12 10:13:50 - Deactivation of Network Lock I 2018.02.12 10:13:55 - Session starting. W 2018.02.12 10:13:55 - The option 'Remove default gateway' will be deprecated soon. I 2018.02.12 10:13:55 - Checking authorization ... ! 2018.02.12 10:13:57 - Connecting to Hatysa (Sweden, Uppsala) . 2018.02.12 10:13:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:13:57 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:13:57 - Connection to OpenVPN Management Interface . 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:13:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:13:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:57 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:13:57 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:13:57 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443 . 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:13:57 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=50ba34e0 92d7e2de . 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:13:57 - OpenVPN > Validating certificate key usage . 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:13:57 - OpenVPN > VERIFY KU OK . 2018.02.12 10:13:57 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:13:57 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hatysa, emailAddress=info@airvpn.org . 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:13:58 - OpenVPN > [Hatysa] Peer Connection Initiated with [AF_INET]62.102.148.144:443 . 2018.02.12 10:14:00 - OpenVPN > SENT CONTROL [Hatysa]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:14:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.127 255.255.0.0,peer-id 13' . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:14:00 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:14:00 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:14:00 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:14:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:14:00 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:14:00 - OpenVPN > /sbin/ip addr add dev tun1 10.4.30.127/16 broadcast 10.4.255.255 . 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 62.102.148.144/32 via 192.168.43.1 . 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:05 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:14:05 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:14:05 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:05 - Routes, added a new route, 62.102.148.160 for gateway 10.4.0.1 . 2018.02.12 10:14:05 - Flushing DNS I 2018.02.12 10:14:06 - Checking DNS . 2018.02.12 10:14:07 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav . 2018.02.12 10:14:07 - Checking DNS (2° try) . 2018.02.12 10:14:10 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav . 2018.02.12 10:14:10 - Checking DNS (3° try) . 2018.02.12 10:14:13 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav E 2018.02.12 10:14:13 - Checking DNS failed. . 2018.02.12 10:14:13 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:14:13 - Disconnecting . 2018.02.12 10:14:13 - Routes, removed a route previously added, 62.102.148.160 for gateway 10.4.0.1 . 2018.02.12 10:14:13 - Sending management termination signal . 2018.02.12 10:14:13 - Management - Send 'signal SIGTERM' . 2018.02.12 10:14:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:14:13 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 62.102.148.144/32 . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:14:18 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:14:18 - OpenVPN > /sbin/ip addr del dev tun1 10.4.30.127/16 . 2018.02.12 10:14:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:14:18 - Connection terminated. . 2018.02.12 10:14:18 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:18 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:14:21 - Checking authorization ... ! 2018.02.12 10:14:21 - Connecting to Nodus (Sweden, Uppsala) . 2018.02.12 10:14:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:14:21 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:14:21 - Connection to OpenVPN Management Interface . 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:14:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:14:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:21 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:14:21 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:14:21 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.133:443 . 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:14:21 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.133:443, sid=b67c45ce e1060fbb . 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:14:22 - OpenVPN > Validating certificate key usage . 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:14:22 - OpenVPN > VERIFY KU OK . 2018.02.12 10:14:22 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:14:22 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nodus, emailAddress=info@airvpn.org . 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:14:22 - OpenVPN > [Nodus] Peer Connection Initiated with [AF_INET]62.102.148.133:443 . 2018.02.12 10:14:24 - OpenVPN > SENT CONTROL [Nodus]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:14:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.163 255.255.0.0,peer-id 10' . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:14:24 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:14:24 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:14:24 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:14:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:14:24 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:14:24 - OpenVPN > /sbin/ip addr add dev tun1 10.4.4.163/16 broadcast 10.4.255.255 . 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 62.102.148.133/32 via 192.168.43.1 . 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:14:29 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:14:29 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:14:30 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:30 - Routes, added a new route, 62.102.148.181 for gateway 10.4.0.1 . 2018.02.12 10:14:30 - Flushing DNS I 2018.02.12 10:14:30 - Checking DNS . 2018.02.12 10:14:33 - Checking DNS failed: . 2018.02.12 10:14:33 - Checking DNS (2° try) . 2018.02.12 10:14:35 - Checking DNS failed: . 2018.02.12 10:14:35 - Checking DNS (3° try) . 2018.02.12 10:14:38 - Checking DNS failed: E 2018.02.12 10:14:38 - Checking DNS failed. . 2018.02.12 10:14:38 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:14:38 - Disconnecting . 2018.02.12 10:14:38 - Routes, removed a route previously added, 62.102.148.181 for gateway 10.4.0.1 . 2018.02.12 10:14:38 - Sending management termination signal . 2018.02.12 10:14:38 - Management - Send 'signal SIGTERM' . 2018.02.12 10:14:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:14:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 62.102.148.133/32 . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:14:43 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:14:43 - OpenVPN > /sbin/ip addr del dev tun1 10.4.4.163/16 . 2018.02.12 10:14:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:14:43 - Connection terminated. . 2018.02.12 10:14:43 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:14:43 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:14:46 - Cancel requested. I 2018.02.12 10:14:46 - Session terminated. ! 2018.02.12 10:16:07 - Activation of Network Lock - Linux iptables I 2018.02.12 10:16:11 - Session starting. W 2018.02.12 10:16:11 - The option 'Remove default gateway' will be deprecated soon. I 2018.02.12 10:16:11 - Checking authorization ... ! 2018.02.12 10:16:13 - Connecting to Nodus (Sweden, Uppsala) . 2018.02.12 10:16:13 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:16:13 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:16:13 - Connection to OpenVPN Management Interface . 2018.02.12 10:16:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:16:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:16:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:13 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:16:13 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:16:13 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.133:443 . 2018.02.12 10:16:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:16:13 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.133:443, sid=37b0c25c 42137f07 . 2018.02.12 10:16:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:16:13 - OpenVPN > Validating certificate key usage . 2018.02.12 10:16:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:16:13 - OpenVPN > VERIFY KU OK . 2018.02.12 10:16:13 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:16:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:16:13 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:16:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nodus, emailAddress=info@airvpn.org . 2018.02.12 10:16:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:16:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:16:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:16:14 - OpenVPN > [Nodus] Peer Connection Initiated with [AF_INET]62.102.148.133:443 . 2018.02.12 10:16:16 - OpenVPN > SENT CONTROL [Nodus]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:16:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.163 255.255.0.0,peer-id 10' . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:16:17 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:16:17 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:16:17 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:16:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:16:17 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:16:17 - OpenVPN > /sbin/ip addr add dev tun1 10.4.4.163/16 broadcast 10.4.255.255 . 2018.02.12 10:16:22 - OpenVPN > /sbin/ip route add 62.102.148.133/32 via 192.168.43.1 . 2018.02.12 10:16:22 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:16:22 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:16:22 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:16:22 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:16:22 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:16:22 - Routes, added a new route, 62.102.148.181 for gateway 10.4.0.1 . 2018.02.12 10:16:22 - Flushing DNS I 2018.02.12 10:16:23 - Checking DNS . 2018.02.12 10:16:25 - Checking DNS failed: . 2018.02.12 10:16:25 - Checking DNS (2° try) . 2018.02.12 10:16:27 - Checking DNS failed: . 2018.02.12 10:16:27 - Checking DNS (3° try) . 2018.02.12 10:16:31 - Checking DNS failed: . 2018.02.12 10:16:31 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:16:31 - Disconnecting . 2018.02.12 10:16:31 - Routes, removed a route previously added, 62.102.148.181 for gateway 10.4.0.1 . 2018.02.12 10:16:31 - Sending management termination signal . 2018.02.12 10:16:31 - Management - Send 'signal SIGTERM' . 2018.02.12 10:16:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:16:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:16:36 - OpenVPN > /sbin/ip route del 62.102.148.133/32 . 2018.02.12 10:16:36 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:16:36 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:16:36 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:16:36 - OpenVPN > /sbin/ip addr del dev tun1 10.4.4.163/16 . 2018.02.12 10:16:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:16:36 - Connection terminated. . 2018.02.12 10:16:36 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1 . 2018.02.12 10:16:36 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:16:36 - Cancel requested. I 2018.02.12 10:16:36 - Session terminated. I 2018.02.12 10:16:44 - Session starting. I 2018.02.12 10:16:47 - Retrieving manifest . 2018.02.12 10:16:47 - Updating systems & servers data ... I 2018.02.12 10:16:47 - Checking authorization ... ! 2018.02.12 10:16:49 - Connecting to Atria (Sweden, Uppsala) . 2018.02.12 10:16:49 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:16:49 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:16:49 - Auto retry with another port. . 2018.02.12 10:16:49 - OpenVPN > MANAGEMENT: Socket bind failed on local address [AF_INET]127.0.0.1:3100: Address already in use . 2018.02.12 10:16:49 - OpenVPN > Exiting due to fatal error ! 2018.02.12 10:16:49 - Disconnecting . 2018.02.12 10:16:49 - Connection terminated. I 2018.02.12 10:16:49 - Checking authorization ... . 2018.02.12 10:16:49 - Systems & servers data update completed ! 2018.02.12 10:16:49 - Connecting to Gomeisa (Sweden, Uppsala) . 2018.02.12 10:16:49 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:16:49 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:16:49 - Connection to OpenVPN Management Interface . 2018.02.12 10:16:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:16:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:16:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:49 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:16:49 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:16:49 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.132:443 . 2018.02.12 10:16:50 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=2449a874 5da3c6f4 . 2018.02.12 10:16:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:16:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:16:50 - OpenVPN > Validating certificate key usage . 2018.02.12 10:16:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:16:50 - OpenVPN > VERIFY KU OK . 2018.02.12 10:16:50 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:16:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:16:50 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:16:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gomeisa, emailAddress=info@airvpn.org . 2018.02.12 10:16:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:16:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:16:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:16:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:16:50 - OpenVPN > [Gomeisa] Peer Connection Initiated with [AF_INET]62.102.148.132:443 . 2018.02.12 10:16:52 - OpenVPN > SENT CONTROL [Gomeisa]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:16:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.41.252 255.255.0.0,peer-id 20' . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:16:53 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:16:53 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:16:53 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:16:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:16:53 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:16:53 - OpenVPN > /sbin/ip addr add dev tun1 10.4.41.252/16 broadcast 10.4.255.255 . 2018.02.12 10:16:59 - OpenVPN > /sbin/ip route add 62.102.148.132/32 via 192.168.43.1 . 2018.02.12 10:16:59 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:16:59 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:16:59 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:16:59 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:16:59 - Routes, added a new route, 62.102.148.183 for gateway 10.4.0.1 . 2018.02.12 10:16:59 - Flushing DNS I 2018.02.12 10:16:59 - Checking route IPv4 I 2018.02.12 10:17:02 - Checking DNS . 2018.02.12 10:17:04 - Checking DNS failed: emwgbikfcajhqaaqholfirfinsqvfuik . 2018.02.12 10:17:04 - Checking DNS (2° try) . 2018.02.12 10:17:06 - Checking DNS failed: emwgbikfcajhqaaqholfirfinsqvfuik . 2018.02.12 10:17:06 - Checking DNS (3° try) . 2018.02.12 10:17:09 - Checking DNS failed: emwgbikfcajhqaaqholfirfinsqvfuik E 2018.02.12 10:17:09 - Checking DNS failed. . 2018.02.12 10:17:09 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:17:09 - Disconnecting . 2018.02.12 10:17:10 - Routes, removed a route previously added, 62.102.148.183 for gateway 10.4.0.1 . 2018.02.12 10:17:10 - Sending management termination signal . 2018.02.12 10:17:10 - Management - Send 'signal SIGTERM' . 2018.02.12 10:17:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:17:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:17:15 - OpenVPN > /sbin/ip route del 62.102.148.132/32 . 2018.02.12 10:17:15 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:17:15 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:17:15 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:17:15 - OpenVPN > /sbin/ip addr del dev tun1 10.4.41.252/16 . 2018.02.12 10:17:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:17:15 - Connection terminated. . 2018.02.12 10:17:15 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:17:18 - Checking authorization ... ! 2018.02.12 10:17:20 - Connecting to Muphrid (Sweden, Uppsala) . 2018.02.12 10:17:20 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:17:20 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:17:20 - Connection to OpenVPN Management Interface . 2018.02.12 10:17:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:17:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:17:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:20 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:17:20 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:17:20 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443 . 2018.02.12 10:17:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:17:20 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=dba0ecca e640fe70 . 2018.02.12 10:17:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:17:22 - OpenVPN > Validating certificate key usage . 2018.02.12 10:17:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:17:22 - OpenVPN > VERIFY KU OK . 2018.02.12 10:17:22 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:17:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:17:22 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:17:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 10:17:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:17:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:17:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:17:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443 . 2018.02.12 10:17:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:17:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.118 255.255.0.0,peer-id 1' . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:17:26 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:17:26 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:17:26 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:17:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:17:26 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:17:26 - OpenVPN > /sbin/ip addr add dev tun1 10.4.11.118/16 broadcast 10.4.255.255 . 2018.02.12 10:17:31 - OpenVPN > /sbin/ip route add 62.102.148.146/32 via 192.168.43.1 . 2018.02.12 10:17:31 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:17:31 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:17:31 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:17:31 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:17:31 - Routes, added a new route, 62.102.148.164 for gateway 10.4.0.1 . 2018.02.12 10:17:31 - Flushing DNS I 2018.02.12 10:17:32 - Checking route IPv4 I 2018.02.12 10:17:34 - Checking DNS . 2018.02.12 10:17:35 - Checking DNS failed: . 2018.02.12 10:17:35 - Checking DNS (2° try) . 2018.02.12 10:17:37 - Checking DNS failed: . 2018.02.12 10:17:37 - Checking DNS (3° try) . 2018.02.12 10:17:44 - Checking DNS failed: E 2018.02.12 10:17:44 - Checking DNS failed. . 2018.02.12 10:17:44 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:17:44 - Disconnecting . 2018.02.12 10:17:44 - Routes, removed a route previously added, 62.102.148.164 for gateway 10.4.0.1 . 2018.02.12 10:17:44 - Sending management termination signal . 2018.02.12 10:17:44 - Management - Send 'signal SIGTERM' . 2018.02.12 10:17:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:17:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:17:49 - OpenVPN > /sbin/ip route del 62.102.148.146/32 . 2018.02.12 10:17:49 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:17:49 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:17:49 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:17:49 - OpenVPN > /sbin/ip addr del dev tun1 10.4.11.118/16 . 2018.02.12 10:17:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:17:49 - Connection terminated. . 2018.02.12 10:17:49 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:17:52 - Checking authorization ... ! 2018.02.12 10:17:52 - Connecting to Gacrux (Sweden, Uppsala) . 2018.02.12 10:17:52 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:17:52 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:17:52 - Connection to OpenVPN Management Interface . 2018.02.12 10:17:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:17:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:17:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:52 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:17:52 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:17:52 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.137:443 . 2018.02.12 10:17:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:17:53 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.137:443, sid=d3f22a56 e002845d . 2018.02.12 10:17:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:17:53 - OpenVPN > Validating certificate key usage . 2018.02.12 10:17:53 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:17:53 - OpenVPN > VERIFY KU OK . 2018.02.12 10:17:53 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:17:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:17:53 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:17:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 10:17:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:17:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:17:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:17:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:17:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.137:443 . 2018.02.12 10:17:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:17:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.70 255.255.0.0' . 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:17:57 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:17:57 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:17:57 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:17:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:17:57 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:17:57 - OpenVPN > /sbin/ip addr add dev tun1 10.4.6.70/16 broadcast 10.4.255.255 . 2018.02.12 10:18:02 - OpenVPN > /sbin/ip route add 62.102.148.137/32 via 192.168.43.1 . 2018.02.12 10:18:02 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:18:02 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:18:02 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:18:02 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:18:02 - Routes, added a new route, 62.102.148.173 for gateway 10.4.0.1 . 2018.02.12 10:18:02 - Flushing DNS I 2018.02.12 10:18:03 - Checking route IPv4 I 2018.02.12 10:18:04 - Checking DNS . 2018.02.12 10:18:05 - Checking DNS failed: . 2018.02.12 10:18:05 - Checking DNS (2° try) . 2018.02.12 10:18:07 - Checking DNS failed: . 2018.02.12 10:18:07 - Checking DNS (3° try) . 2018.02.12 10:18:11 - Checking DNS failed: E 2018.02.12 10:18:11 - Checking DNS failed. . 2018.02.12 10:18:11 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:18:11 - Disconnecting . 2018.02.12 10:18:11 - Routes, removed a route previously added, 62.102.148.173 for gateway 10.4.0.1 . 2018.02.12 10:18:11 - Sending management termination signal . 2018.02.12 10:18:11 - Management - Send 'signal SIGTERM' . 2018.02.12 10:18:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:18:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:18:16 - OpenVPN > /sbin/ip route del 62.102.148.137/32 . 2018.02.12 10:18:16 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:18:16 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:18:16 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:18:16 - OpenVPN > /sbin/ip addr del dev tun1 10.4.6.70/16 . 2018.02.12 10:18:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:18:16 - Connection terminated. . 2018.02.12 10:18:16 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:18:19 - Checking authorization ... ! 2018.02.12 10:18:20 - Connecting to Atria (Sweden, Uppsala) . 2018.02.12 10:18:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:18:21 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:18:21 - Connection to OpenVPN Management Interface . 2018.02.12 10:18:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:18:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:18:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:18:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:18:21 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:18:21 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:18:21 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443 . 2018.02.12 10:18:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:18:21 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=e0f82b46 c0f93b76 . 2018.02.12 10:18:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:18:21 - OpenVPN > Validating certificate key usage . 2018.02.12 10:18:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:18:21 - OpenVPN > VERIFY KU OK . 2018.02.12 10:18:21 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:18:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:18:21 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:18:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Atria, emailAddress=info@airvpn.org . 2018.02.12 10:18:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:18:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:18:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:18:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:18:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:18:21 - OpenVPN > [Atria] Peer Connection Initiated with [AF_INET]62.102.148.150:443 . 2018.02.12 10:18:23 - OpenVPN > SENT CONTROL [Atria]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:18:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.35.81 255.255.0.0,peer-id 134' . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:18:25 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:18:25 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:18:25 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:18:25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:18:25 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:18:25 - OpenVPN > /sbin/ip addr add dev tun1 10.4.35.81/16 broadcast 10.4.255.255 ! 2018.02.12 10:18:30 - Disconnecting . 2018.02.12 10:18:30 - Sending management termination signal . 2018.02.12 10:18:30 - Management - Send 'signal SIGTERM' . 2018.02.12 10:18:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:18:30 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:18:30 - OpenVPN > /sbin/ip route add 62.102.148.150/32 via 192.168.43.1 . 2018.02.12 10:18:30 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:18:30 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:18:30 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:18:30 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:18:30 - Routes, added a new route, 62.102.148.189 for gateway 10.4.0.1 . 2018.02.12 10:18:30 - Flushing DNS . 2018.02.12 10:18:31 - OpenVPN > Initialization Sequence Completed . 2018.02.12 10:18:35 - OpenVPN > /sbin/ip route del 62.102.148.150/32 . 2018.02.12 10:18:35 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:18:35 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:18:35 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:18:35 - OpenVPN > /sbin/ip addr del dev tun1 10.4.35.81/16 . 2018.02.12 10:18:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:18:35 - Connection terminated. . 2018.02.12 10:18:35 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:18:35 - Cancel requested. I 2018.02.12 10:18:35 - Session terminated. Unexpected Crash: . 2018.02.12 10:20:31 - Eddie version: 2.14.0 / linux_x64, System: Linux, Name: Linux Mint 18 Sarah \n \l, Version: Linux XLY 4.4.0-21-generic #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319 . 2018.02.12 10:20:31 - Reading options from /home/master/.airvpn/AirVPN.xml . 2018.02.12 10:20:32 - Command line arguments (3): path="/home/master/.airvpn" path.resources="/usr/share/AirVPN" console.mode="none" . 2018.02.12 10:20:33 - OpenVPN Driver - Found, /dev/net/tun . 2018.02.12 10:20:33 - OpenVPN - Version: 2.3.10 - OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn) . 2018.02.12 10:20:33 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.4, OpenSSL 1.0.2g 1 Mar 2016 (/usr/bin/ssh) . 2018.02.12 10:20:33 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4) . 2018.02.12 10:20:33 - curl - Version: 7.47.0 (/usr/bin/curl) . 2018.02.12 10:20:33 - Certification Authorities: /usr/share/AirVPN/cacert.pem W 2018.02.12 10:20:33 - Recovery. Unexpected crash? . 2018.02.12 10:20:33 - Routes, removed a route previously added, 213.152.161.181 for gateway 10.4.0.1 . 2018.02.12 10:20:33 - Above log line repeated 1 times more . 2018.02.12 10:20:33 - Routes, removed a route previously added, 62.102.148.160 for gateway 10.4.0.1 . 2018.02.12 10:20:33 - Routes, removed a route previously added, 62.102.148.189 for gateway 10.4.0.1 . 2018.02.12 10:20:33 - Updating systems & servers data ... I 2018.02.12 10:20:33 - Ready . 2018.02.12 10:20:34 - Systems & servers data update completed Bug. In connection with the prior bugs, I tried checking "Check Air DNS" again. This time I tried connecting to experimental Castor location and the results were a little different, but I still couldn't connect in the end: I 2018.02.12 10:45:05 - Session terminated. I 2018.02.12 10:45:15 - Session starting. I 2018.02.12 10:45:15 - Checking authorization ... ! 2018.02.12 10:45:17 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 10:45:17 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:45:17 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:45:17 - Connection to OpenVPN Management Interface . 2018.02.12 10:45:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:45:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:45:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:17 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:45:17 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:45:17 - OpenVPN > UDPv4 link remote: [AF_INET]91.207.57.114:443 . 2018.02.12 10:45:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:45:17 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.114:443, sid=34216bbf 17d9ac02 . 2018.02.12 10:45:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:45:17 - OpenVPN > Validating certificate key usage . 2018.02.12 10:45:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:45:17 - OpenVPN > VERIFY KU OK . 2018.02.12 10:45:17 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:45:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:45:17 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:45:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org . 2018.02.12 10:45:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:45:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:45:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:45:18 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET]91.207.57.114:443 . 2018.02.12 10:45:20 - OpenVPN > SENT CONTROL [Castor]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:45:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.16.0.1,route-gateway 10.16.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.16.0.40 255.255.0.0,peer-id 0' . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:45:21 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:45:21 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:45:21 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:45:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:45:21 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:45:21 - OpenVPN > /sbin/ip addr add dev tun1 10.16.0.40/16 broadcast 10.16.255.255 . 2018.02.12 10:45:26 - OpenVPN > /sbin/ip route add 91.207.57.114/32 via 192.168.43.1 . 2018.02.12 10:45:26 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.16.0.1 . 2018.02.12 10:45:26 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.16.0.1 . 2018.02.12 10:45:26 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:45:26 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:45:26 - Routes, added a new route, 91.207.57.115 for gateway 10.16.0.1 . 2018.02.12 10:45:26 - Unable to compute route for 2001:ac8:27:f:c0ca:9f36:68ed:1e70: IPv6 VPN gateway not available. . 2018.02.12 10:45:26 - Flushing DNS I 2018.02.12 10:45:27 - Checking route IPv4 I 2018.02.12 10:45:28 - Checking route IPv6 . 2018.02.12 10:45:28 - curl: (7) Couldn't connect to server . 2018.02.12 10:45:28 - Checking route (2° try) . 2018.02.12 10:45:29 - curl: (7) Couldn't connect to server . 2018.02.12 10:45:29 - Checking route (3° try) . 2018.02.12 10:45:31 - curl: (7) Couldn't connect to server E 2018.02.12 10:45:31 - Checking route IPv6 failed. . 2018.02.12 10:45:31 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:45:31 - Disconnecting . 2018.02.12 10:45:31 - Routes, removed a route previously added, 91.207.57.115 for gateway 10.16.0.1 . 2018.02.12 10:45:31 - Sending management termination signal . 2018.02.12 10:45:31 - Management - Send 'signal SIGTERM' . 2018.02.12 10:45:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 10:45:32 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:45:36 - OpenVPN > /sbin/ip route del 91.207.57.114/32 . 2018.02.12 10:45:36 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 10:45:36 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 10:45:36 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 10:45:36 - OpenVPN > /sbin/ip addr del dev tun1 10.16.0.40/16 . 2018.02.12 10:45:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.02.12 10:45:36 - Connection terminated. . 2018.02.12 10:45:36 - DNS of the system restored to original settings (Rename method) I 2018.02.12 10:45:39 - Checking authorization ... ! 2018.02.12 10:45:39 - Connecting to Chara (Netherlands, Alblasserdam) . 2018.02.12 10:45:39 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:45:39 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:45:39 - Connection to OpenVPN Management Interface . 2018.02.12 10:45:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:45:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:45:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:39 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:45:39 - OpenVPN > UDPv4 link local: [undef] . 2018.02.12 10:45:39 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.132:443 . 2018.02.12 10:45:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:45:39 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=87d1479d c9a4fc3b . 2018.02.12 10:45:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 10:45:40 - OpenVPN > Validating certificate key usage . 2018.02.12 10:45:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 10:45:40 - OpenVPN > VERIFY KU OK . 2018.02.12 10:45:40 - OpenVPN > Validating certificate extended key usage . 2018.02.12 10:45:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 10:45:40 - OpenVPN > VERIFY EKU OK . 2018.02.12 10:45:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 10:45:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:45:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 10:45:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:45:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 10:45:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2018.02.12 10:45:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 10:45:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.52 255.255.0.0,peer-id 50' . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2018.02.12 10:45:43 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 10:45:43 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 10:45:43 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 10:45:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 10:45:43 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 10:45:43 - OpenVPN > /sbin/ip addr add dev tun1 10.4.3.52/16 broadcast 10.4.255.255 . 2018.02.12 10:45:48 - OpenVPN > /sbin/ip route add 109.232.227.132/32 via 192.168.43.1 . 2018.02.12 10:45:48 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:45:48 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 . 2018.02.12 10:45:48 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 10:45:48 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 10:45:48 - Routes, added a new route, 109.232.227.133 for gateway 10.4.0.1 . 2018.02.12 10:45:48 - Flushing DNS I 2018.02.12 10:45:49 - Checking route IPv4 I 2018.02.12 10:45:53 - Checking DNS . 2018.02.12 10:45:55 - Checking DNS failed: . 2018.02.12 10:45:55 - Checking DNS (2° try) . 2018.02.12 10:45:57 - Checking DNS failed: . 2018.02.12 10:45:57 - Checking DNS (3° try) . 2018.02.12 10:46:01 - Checking DNS failed: E 2018.02.12 10:46:01 - Checking DNS failed. . 2018.02.12 10:46:01 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 10:46:01 - Disconnecting . 2018.02.12 10:46:01 - Routes, removed a route previously added, 109.232.227.133 for gateway 10.4.0.1 Bug. This time I went to Preferences>Networking>IP protocols>selected IP6 ONLY. The errors were completely different, but I still couldn't connect. Other protocols are set to automatic, NL is enabled, "Check Air DNS" and "Check if tunnel works" are checked. After doing the tests, I then went to Preferences>Network Lock>Unchecked "Allow Detected DNS", which I had checked by a mistake. I 2018.02.12 10:50:25 - Checking authorization ... ! 2018.02.12 10:50:27 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 10:50:27 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:50:27 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:50:27 - Connection to OpenVPN Management Interface . 2018.02.12 10:50:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:50:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:50:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:50:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:50:27 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:50:27 - OpenVPN > UDPv6 link local: [undef] . 2018.02.12 10:50:27 - OpenVPN > UDPv6 link remote: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 . 2018.02.12 10:50:27 - OpenVPN > write UDPv6: Network is unreachable (code=101) . 2018.02.12 10:50:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:50:30 - OpenVPN > write UDPv6: Network is unreachable (code=101) . 2018.02.12 10:50:41 - Above log line repeated 1 times more . 2018.02.12 10:50:41 - Updating systems & servers data ... . 2018.02.12 10:50:41 - OpenVPN > write UDPv6: Network is unreachable (code=101) . 2018.02.12 10:50:44 - Systems & servers data update completed . 2018.02.12 10:50:57 - OpenVPN > write UDPv6: Network is unreachable (code=101) . 2018.02.12 10:50:59 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting . 2018.02.12 10:50:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:51:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2018.02.12 10:51:04 - Disconnecting . 2018.02.12 10:51:04 - Connection terminated. I 2018.02.12 10:51:07 - Checking authorization ... ! 2018.02.12 10:51:09 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:09 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:09 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:09 - Disconnecting . 2018.02.12 10:51:09 - Connection terminated. I 2018.02.12 10:51:12 - Checking authorization ... ! 2018.02.12 10:51:14 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:14 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:14 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:14 - Disconnecting . 2018.02.12 10:51:14 - Connection terminated. I 2018.02.12 10:51:17 - Checking authorization ... ! 2018.02.12 10:51:19 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:19 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:19 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:19 - Disconnecting . 2018.02.12 10:51:19 - Connection terminated. I 2018.02.12 10:51:22 - Checking authorization ... ! 2018.02.12 10:51:23 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:24 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:24 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:24 - Disconnecting . 2018.02.12 10:51:24 - Connection terminated. I 2018.02.12 10:51:27 - Checking authorization ... ! 2018.02.12 10:51:28 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:28 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:28 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:28 - Disconnecting . 2018.02.12 10:51:28 - Connection terminated. I 2018.02.12 10:51:31 - Checking authorization ... ! 2018.02.12 10:51:33 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:33 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:33 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:33 - Disconnecting . 2018.02.12 10:51:33 - Connection terminated. I 2018.02.12 10:51:36 - Checking authorization ... ! 2018.02.12 10:51:38 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:38 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:38 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:38 - Disconnecting . 2018.02.12 10:51:38 - Connection terminated. I 2018.02.12 10:51:41 - Checking authorization ... ! 2018.02.12 10:51:43 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:43 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:43 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:43 - Disconnecting . 2018.02.12 10:51:43 - Connection terminated. I 2018.02.12 10:51:46 - Checking authorization ... ! 2018.02.12 10:51:49 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:49 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:49 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:49 - Disconnecting . 2018.02.12 10:51:49 - Connection terminated. I 2018.02.12 10:51:52 - Checking authorization ... ! 2018.02.12 10:51:53 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:53 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:53 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:53 - Disconnecting . 2018.02.12 10:51:53 - Connection terminated. I 2018.02.12 10:51:56 - Checking authorization ... ! 2018.02.12 10:51:58 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:51:58 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:51:58 - OpenVPN > Use --help for more information. ! 2018.02.12 10:51:58 - Disconnecting . 2018.02.12 10:51:58 - Connection terminated. I 2018.02.12 10:52:01 - Checking authorization ... ! 2018.02.12 10:52:02 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:52:03 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:52:03 - OpenVPN > Use --help for more information. ! 2018.02.12 10:52:03 - Disconnecting . 2018.02.12 10:52:03 - Connection terminated. I 2018.02.12 10:52:06 - Checking authorization ... I 2018.02.12 10:52:08 - Cancel requested. I 2018.02.12 10:52:08 - Session terminated. I 2018.02.12 10:54:35 - Session starting. I 2018.02.12 10:54:35 - Checking authorization ... ! 2018.02.12 10:54:36 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 10:54:36 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 10:54:36 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 10:54:36 - Connection to OpenVPN Management Interface . 2018.02.12 10:54:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 10:54:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 10:54:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:54:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 10:54:36 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.02.12 10:54:36 - OpenVPN > UDPv6 link local: [undef] . 2018.02.12 10:54:36 - OpenVPN > UDPv6 link remote: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 . 2018.02.12 10:54:36 - OpenVPN > write UDPv6: Network is unreachable (code=101) . 2018.02.12 10:54:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 10:54:39 - OpenVPN > write UDPv6: Network is unreachable (code=101) . 2018.02.12 10:55:08 - Above log line repeated 3 times more . 2018.02.12 10:55:08 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting . 2018.02.12 10:55:08 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.02.12 10:55:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2018.02.12 10:55:13 - Disconnecting . 2018.02.12 10:55:13 - Connection terminated. I 2018.02.12 10:55:16 - Checking authorization ... ! 2018.02.12 10:55:17 - Connecting to Alchiba (Netherlands, Alblasserdam) W 2018.02.12 10:55:18 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote . 2018.02.12 10:55:18 - OpenVPN > Use --help for more information. ! 2018.02.12 10:55:18 - Disconnecting . 2018.02.12 10:55:18 - Connection terminated. I 2018.02.12 10:55:21 - Checking authorization ... I 2018.02.12 10:55:22 - Cancel requested. I 2018.02.12 10:55:22 - Session terminated. Critical Bug(Probably just error 40). Then I tried picking TCP 443 in Preferences>Protocols due to the UDP6 errors before, as well as picking Preferences>Networking>IP6 ONLY. Regardless of if I checked one, both or neither of "Check Air DNS" and "Check if tunnel works", I couldn't connect to Castor. NL was on. It just refuses to connect, with no apparent errors. THEN I noticed something: I can browse online(!) Eddie is disconnected, but Network Lock is on, but I can browse; which can't happen for me normally. What's more, I checked ipleak.net immediately and the strange thing is, that my IP address belongs to a non-Castor Air location, but my DNS is showing my real one. For the IP address, ipleak says: IPv6 test not reachable and it was indeed an IP4 address which showed, despite how I had selected "IP6 only" before. I 2018.02.12 11:07:15 - Session starting. I 2018.02.12 11:07:15 - Checking authorization ... ! 2018.02.12 11:07:15 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:07:15 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:07:15 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:07:15 - Connection to OpenVPN Management Interface . 2018.02.12 11:07:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:07:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:15 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:07:15 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:07:15 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:07:15 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:07:15 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:07:15 - Disconnecting . 2018.02.12 11:07:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:15 - Sending management termination signal . 2018.02.12 11:07:15 - Management - Send 'signal SIGTERM' . 2018.02.12 11:07:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:07:15 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:07:15 - Connection terminated. I 2018.02.12 11:07:18 - Checking authorization ... ! 2018.02.12 11:07:21 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:07:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:07:21 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:07:21 - Connection to OpenVPN Management Interface . 2018.02.12 11:07:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:07:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:21 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:07:21 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:07:21 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:07:21 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:07:21 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:07:21 - Disconnecting . 2018.02.12 11:07:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:21 - Sending management termination signal . 2018.02.12 11:07:21 - Management - Send 'signal SIGTERM' . 2018.02.12 11:07:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:07:21 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:07:21 - Connection terminated. I 2018.02.12 11:07:24 - Checking authorization ... ! 2018.02.12 11:07:25 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:07:25 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:07:25 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:07:25 - Connection to OpenVPN Management Interface . 2018.02.12 11:07:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:07:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:25 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:07:25 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:07:25 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:07:25 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:07:25 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:07:25 - Disconnecting . 2018.02.12 11:07:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:25 - Sending management termination signal . 2018.02.12 11:07:25 - Management - Send 'signal SIGTERM' . 2018.02.12 11:07:25 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:07:25 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:07:25 - Connection terminated. I 2018.02.12 11:07:28 - Checking authorization ... ! 2018.02.12 11:07:30 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:07:30 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:07:30 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:07:30 - Connection to OpenVPN Management Interface . 2018.02.12 11:07:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:07:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:30 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:07:30 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:07:30 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:07:30 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:07:30 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:07:30 - Disconnecting . 2018.02.12 11:07:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:30 - Sending management termination signal . 2018.02.12 11:07:30 - Management - Send 'signal SIGTERM' . 2018.02.12 11:07:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:07:30 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:07:30 - Connection terminated. I 2018.02.12 11:07:33 - Checking authorization ... ! 2018.02.12 11:07:36 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:07:36 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:07:36 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:07:36 - Connection to OpenVPN Management Interface . 2018.02.12 11:07:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:07:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:36 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:07:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:07:36 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:07:36 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:07:36 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:07:36 - Disconnecting . 2018.02.12 11:07:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:36 - Sending management termination signal . 2018.02.12 11:07:36 - Management - Send 'signal SIGTERM' . 2018.02.12 11:07:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:07:36 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:07:36 - Connection terminated. I 2018.02.12 11:07:38 - Cancel requested. I 2018.02.12 11:07:38 - Session terminated. I 2018.02.12 11:07:49 - Session starting. I 2018.02.12 11:07:49 - Checking authorization ... ! 2018.02.12 11:07:51 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:07:51 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:07:51 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:07:51 - Connection to OpenVPN Management Interface . 2018.02.12 11:07:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:07:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:51 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:07:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:07:51 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:07:51 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:07:51 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:07:51 - Disconnecting . 2018.02.12 11:07:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:51 - Sending management termination signal . 2018.02.12 11:07:51 - Management - Send 'signal SIGTERM' . 2018.02.12 11:07:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:07:51 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:07:51 - Connection terminated. I 2018.02.12 11:07:54 - Checking authorization ... ! 2018.02.12 11:07:56 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:07:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:07:57 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:07:57 - Connection to OpenVPN Management Interface . 2018.02.12 11:07:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:07:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:07:57 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:07:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:07:57 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:07:57 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:07:57 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:07:57 - Disconnecting . 2018.02.12 11:07:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:07:57 - Sending management termination signal . 2018.02.12 11:07:57 - Management - Send 'signal SIGTERM' . 2018.02.12 11:07:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:07:57 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:07:57 - Connection terminated. I 2018.02.12 11:08:00 - Checking authorization ... ! 2018.02.12 11:08:02 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:08:02 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:08:02 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:08:02 - Connection to OpenVPN Management Interface . 2018.02.12 11:08:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:08:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:02 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:08:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:08:02 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:08:02 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:08:02 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:08:02 - Disconnecting . 2018.02.12 11:08:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:02 - Sending management termination signal . 2018.02.12 11:08:02 - Management - Send 'signal SIGTERM' . 2018.02.12 11:08:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:08:02 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:08:02 - Connection terminated. I 2018.02.12 11:08:05 - Checking authorization ... ! 2018.02.12 11:08:07 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:08:07 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:08:07 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:08:07 - Connection to OpenVPN Management Interface . 2018.02.12 11:08:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:08:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:07 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:08:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:08:07 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:08:07 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:08:07 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:08:07 - Disconnecting . 2018.02.12 11:08:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:07 - Sending management termination signal . 2018.02.12 11:08:07 - Management - Send 'signal SIGTERM' . 2018.02.12 11:08:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:08:07 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:08:07 - Connection terminated. I 2018.02.12 11:08:10 - Checking authorization ... ! 2018.02.12 11:08:12 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:08:12 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:08:12 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:08:12 - Connection to OpenVPN Management Interface . 2018.02.12 11:08:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:08:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:12 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:08:12 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:08:12 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:08:12 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:08:12 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:08:12 - Disconnecting . 2018.02.12 11:08:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:12 - Sending management termination signal . 2018.02.12 11:08:12 - Management - Send 'signal SIGTERM' . 2018.02.12 11:08:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:08:12 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:08:12 - Connection terminated. I 2018.02.12 11:08:15 - Cancel requested. I 2018.02.12 11:08:15 - Session terminated. I 2018.02.12 11:08:33 - Session starting. I 2018.02.12 11:08:33 - Checking authorization ... ! 2018.02.12 11:08:35 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:08:35 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:08:35 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:08:35 - Connection to OpenVPN Management Interface . 2018.02.12 11:08:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:08:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:35 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:08:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:08:35 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:08:35 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:08:35 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:08:35 - Disconnecting . 2018.02.12 11:08:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:35 - Sending management termination signal . 2018.02.12 11:08:35 - Management - Send 'signal SIGTERM' . 2018.02.12 11:08:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:08:35 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:08:35 - Connection terminated. I 2018.02.12 11:08:38 - Checking authorization ... ! 2018.02.12 11:08:40 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:08:40 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:08:40 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:08:40 - Connection to OpenVPN Management Interface . 2018.02.12 11:08:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:08:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:40 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:08:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:08:40 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:08:40 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:08:40 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:08:40 - Disconnecting . 2018.02.12 11:08:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:40 - Sending management termination signal . 2018.02.12 11:08:40 - Management - Send 'signal SIGTERM' . 2018.02.12 11:08:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:08:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:08:40 - Connection terminated. I 2018.02.12 11:08:43 - Checking authorization ... ! 2018.02.12 11:08:45 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:08:45 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:08:45 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:08:45 - Connection to OpenVPN Management Interface . 2018.02.12 11:08:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:08:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:45 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:08:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:08:45 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:08:45 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:08:45 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:08:45 - Disconnecting . 2018.02.12 11:08:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:45 - Sending management termination signal . 2018.02.12 11:08:45 - Management - Send 'signal SIGTERM' . 2018.02.12 11:08:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:08:46 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:08:46 - Connection terminated. I 2018.02.12 11:08:49 - Checking authorization ... ! 2018.02.12 11:08:51 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:08:51 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:08:51 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:08:51 - Connection to OpenVPN Management Interface . 2018.02.12 11:08:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:08:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:08:51 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:08:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:08:51 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:08:51 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:08:51 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:08:51 - Disconnecting . 2018.02.12 11:08:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:08:51 - Sending management termination signal . 2018.02.12 11:08:51 - Management - Send 'signal SIGTERM' . 2018.02.12 11:08:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:08:51 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:08:51 - Connection terminated. I 2018.02.12 11:08:54 - Checking authorization ... ! 2018.02.12 11:09:00 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:09:00 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:09:00 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:09:00 - Connection to OpenVPN Management Interface . 2018.02.12 11:09:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:09:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:09:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:09:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:09:00 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:09:00 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock] . 2018.02.12 11:09:00 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable . 2018.02.12 11:09:00 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting . 2018.02.12 11:09:00 - OpenVPN > Restart pause, 5 second(s) ! 2018.02.12 11:09:00 - Disconnecting . 2018.02.12 11:09:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:09:00 - Sending management termination signal . 2018.02.12 11:09:00 - Management - Send 'signal SIGTERM' . 2018.02.12 11:09:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:09:00 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2018.02.12 11:09:00 - Connection terminated. I 2018.02.12 11:09:03 - Cancel requested. I 2018.02.12 11:09:03 - Session terminated. Then I went back into Preferences>Networking>Put IP protocol back to the default and despite how "Check Air DNS" and "Check if tunnel works" are checked, I can now connect to an ordinary non-Castor location... With some errors on the way, which were seen at the beginning. I don't get it. I'm still on the TCP 443 protocol, NL was enabled the whole time I'm not leaking on ipleak anymore: ! 2018.02.12 11:18:03 - Connecting to Castor (Belgium, Brussels) . 2018.02.12 11:18:03 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:18:03 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:18:03 - Connection to OpenVPN Management Interface . 2018.02.12 11:18:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:18:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:18:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:18:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:18:03 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:18:03 - OpenVPN > Attempting to establish TCP connection with [AF_INET]91.207.57.114:443 [nonblock] . 2018.02.12 11:18:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:18:04 - OpenVPN > TCP connection established with [AF_INET]91.207.57.114:443 . 2018.02.12 11:18:04 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2018.02.12 11:18:04 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]91.207.57.114:443 . 2018.02.12 11:18:04 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.114:443, sid=d7283fe2 b6a0daa8 . 2018.02.12 11:18:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 11:18:05 - OpenVPN > Validating certificate key usage . 2018.02.12 11:18:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 11:18:05 - OpenVPN > VERIFY KU OK . 2018.02.12 11:18:05 - OpenVPN > Validating certificate extended key usage . 2018.02.12 11:18:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 11:18:05 - OpenVPN > VERIFY EKU OK . 2018.02.12 11:18:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org . 2018.02.12 11:18:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 11:18:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:18:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 11:18:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:18:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 11:18:06 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET]91.207.57.114:443 . 2018.02.12 11:18:08 - OpenVPN > SENT CONTROL [Castor]: 'PUSH_REQUEST' (status=1) . 2018.02.12 11:18:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.0.1,route-gateway 10.15.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.0.10 255.255.0.0,peer-id 0' . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563 . 2018.02.12 11:18:09 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 11:18:09 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 11:18:09 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 11:18:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 11:18:09 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 11:18:09 - OpenVPN > /sbin/ip addr add dev tun1 10.15.0.10/16 broadcast 10.15.255.255 . 2018.02.12 11:18:15 - OpenVPN > /sbin/ip route add 91.207.57.114/32 via 192.168.43.1 . 2018.02.12 11:18:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.15.0.1 . 2018.02.12 11:18:15 - OpenVPN > RTNETLINK answers: File exists E 2018.02.12 11:18:15 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2 . 2018.02.12 11:18:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.15.0.1 . 2018.02.12 11:18:15 - OpenVPN > RTNETLINK answers: File exists E 2018.02.12 11:18:15 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2 . 2018.02.12 11:18:15 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 11:18:15 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 11:18:15 - Routes, added a new route, 91.207.57.115 for gateway 10.15.0.1 . 2018.02.12 11:18:15 - Unable to compute route for 2001:ac8:27:f:c0ca:9f36:68ed:1e70: IPv6 VPN gateway not available. . 2018.02.12 11:18:15 - Flushing DNS I 2018.02.12 11:18:15 - Checking route IPv4 . 2018.02.12 11:18:35 - curl: (28) Connection timed out after 20001 milliseconds . 2018.02.12 11:18:35 - Checking route (2° try) . 2018.02.12 11:18:56 - curl: (28) Connection timed out after 20001 milliseconds . 2018.02.12 11:18:56 - Checking route (3° try) . 2018.02.12 11:19:18 - curl: (28) Connection timed out after 20000 milliseconds E 2018.02.12 11:19:18 - Checking route IPv4 failed. . 2018.02.12 11:19:18 - OpenVPN > Initialization Sequence Completed ! 2018.02.12 11:19:18 - Disconnecting . 2018.02.12 11:19:18 - Routes, removed a route previously added, 91.207.57.115 for gateway 10.15.0.1 . 2018.02.12 11:19:18 - OpenVPN > [Castor] Inactivity timeout (--ping-restart), restarting . 2018.02.12 11:19:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2018.02.12 11:19:18 - OpenVPN > Restart pause, 5 second(s) . 2018.02.12 11:19:18 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:19:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]91.207.57.114:443 [nonblock] . 2018.02.12 11:19:18 - OpenVPN > TCP connection established with [AF_INET]91.207.57.114:443 . 2018.02.12 11:19:18 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2018.02.12 11:19:18 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]91.207.57.114:443 . 2018.02.12 11:19:18 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.114:443, sid=69f71f8e 73aa2e5c . 2018.02.12 11:19:18 - Sending management termination signal . 2018.02.12 11:19:18 - Management - Send 'signal SIGTERM' . 2018.02.12 11:19:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.02.12 11:19:19 - OpenVPN > /sbin/ip route del 91.207.57.114/32 . 2018.02.12 11:19:19 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2018.02.12 11:19:19 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2018.02.12 11:19:19 - OpenVPN > Closing TUN/TAP interface . 2018.02.12 11:19:19 - OpenVPN > /sbin/ip addr del dev tun1 10.15.0.10/16 . 2018.02.12 11:19:19 - OpenVPN > SIGTERM[hard,] received, process exiting . 2018.02.12 11:19:19 - Connection terminated. . 2018.02.12 11:19:19 - DNS of the system restored to original settings (Rename method) I 2018.02.12 11:19:22 - Checking authorization ... ! 2018.02.12 11:19:22 - Connecting to Alphard (Netherlands, Alblasserdam) . 2018.02.12 11:19:22 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017 . 2018.02.12 11:19:22 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2018.02.12 11:19:22 - Connection to OpenVPN Management Interface . 2018.02.12 11:19:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2018.02.12 11:19:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2018.02.12 11:19:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:19:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:19:22 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384] . 2018.02.12 11:19:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]109.202.107.9:443 [nonblock] . 2018.02.12 11:19:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101 . 2018.02.12 11:19:23 - OpenVPN > TCP connection established with [AF_INET]109.202.107.9:443 . 2018.02.12 11:19:23 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2018.02.12 11:19:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]109.202.107.9:443 . 2018.02.12 11:19:23 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=f0b8cd56 90f6c23a . 2018.02.12 11:19:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.02.12 11:19:23 - OpenVPN > Validating certificate key usage . 2018.02.12 11:19:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2018.02.12 11:19:23 - OpenVPN > VERIFY KU OK . 2018.02.12 11:19:23 - OpenVPN > Validating certificate extended key usage . 2018.02.12 11:19:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.02.12 11:19:23 - OpenVPN > VERIFY EKU OK . 2018.02.12 11:19:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.02.12 11:19:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 11:19:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:19:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2018.02.12 11:19:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.02.12 11:19:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.02.12 11:19:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.9:443 . 2018.02.12 11:19:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.02.12 11:19:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.2.152 255.255.0.0,peer-id 0' . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563 . 2018.02.12 11:19:27 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af . 2018.02.12 11:19:27 - OpenVPN > TUN/TAP device tun1 opened . 2018.02.12 11:19:27 - OpenVPN > TUN/TAP TX queue length set to 100 . 2018.02.12 11:19:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2018.02.12 11:19:27 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500 . 2018.02.12 11:19:28 - OpenVPN > /sbin/ip addr add dev tun1 10.5.2.152/16 broadcast 10.5.255.255 . 2018.02.12 11:19:33 - OpenVPN > /sbin/ip route add 109.202.107.9/32 via 192.168.43.1 . 2018.02.12 11:19:33 - OpenVPN > RTNETLINK answers: File exists E 2018.02.12 11:19:33 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2 . 2018.02.12 11:19:33 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.5.0.1 . 2018.02.12 11:19:33 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.5.0.1 . 2018.02.12 11:19:33 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2018.02.12 11:19:33 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2018.02.12 11:19:33 - Routes, added a new route, 109.202.107.10 for gateway 10.5.0.1 . 2018.02.12 11:19:33 - Flushing DNS I 2018.02.12 11:19:34 - Checking route IPv4 I 2018.02.12 11:19:38 - Checking DNS ! 2018.02.12 11:19:39 - Connected. I hope this was a little helpful. Apologies if you got a headache Thank you .
  18. Hello! Welcome! It's really best if you let Air take a look at this. But you can try take a look in your Client Area and see if anything has been registered and is pending. It's not always hassle-free using PP in conjunction with Air, due to how PP does things sometimes. At any rate, good support takes time .
  19. Hello! Did you make sure your computer isn't going into any sort of hibernation or low power state? If you're using Eddie and you configured your torrent client correctly (see the New User guide in my signature if you need details), your ISP wouldn't know what you were up to anyway, so a warning is unlikely. But if you're unsure, simply make sure Network Lock is enabled and then go to ipleak.net and download the test torrent. Then you can see if you're leaking anything while torrenting. I don't know what that SmartThings is, but it has little to do with any sort of killswitch I think. Eddie's "killswitch" is the Network Lock. Also, if Eddie were doing something wrong, you would see it in the logs, which you could share with us. If there was a disconnect during the night, you would see it in the logs. You could try pinpoint which warning logo you're seeing.
  20. Did you try updating your qBittorent client? I don't know what your OS is, but if you're using 3.3.16 you're quite far behind and that would explain the missing features. Are you saying you forwarded ports both on your router and in your client? Be careful with that.
  21. Hello! Frustration is normal. You can go to the New User guide in my signature and then scroll to the guides section, to find guidance on configuring torrent clients like qBittorent .
  22. It's not ideal to disable DNS check, but to my understanding, as long as you use Network Lock you'll be good. The forums are open for all. While you'll see the Staff account commenting quite frequently. They're the ones who run Air. But if you want real professional support, you can always use the Contact Us tab You could also try out the experimental client. I doubt if it'll change anything, but it can hardly hurt in most cases. But otherwise your issue is fixed for now at least.
  23. Hello! This has been raised many times before and it's nothing that can't be fixed. First of all, please check you're using the latest Eddie client, by going to Eddie's menu > About. Otherwise please head to the download page to get the latest stable release. Were you using Network Lock? If so, that's likely what went wrong: it was on and then you closed Eddie in an "improper" way and therefore it couldn't restore the pre-Network Lock settings. Thus no Internet access. Just follow this until step 3, but select the "Obtain automatically" option. Then you should be able to connect again.
  24. Hello! You're right that it's almost only the Netherlands which get a 403. Did you get error 1005 too on their site?
  25. Hello! Since you used the latest experimental, it would be beneficial if you reported it in the experimentals own thread and perhaps it'll be fixed in the next iteration .
×
×
  • Create New...