Jump to content
Not connected, Your IP: 18.222.188.218

LZ1

Members2
  • Content Count

    2089
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    83

Everything posted by LZ1

  1. Hello! You're not anonymous to begin with, most likely. VPNs claiming to make you anonymous, use this more as a marketing ploy than anything else. Why would you login to Amazon, a service which presumably has identifying information about you, with a VPN, whose objective is to hide exactly such information?Seems self-defeating. Air does have Shared IPs of course and a variety of other technological measures to counter you being identified, but they can't prevent stupid users doing stupid things . Otherwise yes, if you used the same server all the time, Amazon would keep associating that servers IP address with your account probably. Especially if you only ever used the same IP.
  2. You're welcome. Netflix is no longer officially supported by AirVPN (if it ever really was), due to Netflix blocking VPNs to such a high degree that it's very uncertain when you can or can't access Netflix' content. Sometimes switching to other Air servers works, sometimes not. But it's limited what Air can do. Plugins can have a whole host of security issues - so it's hard to say really. You could always experiment with whatever software you wish to try, in a Virtual Machine. I wouldn't say the security threat is "limited" - I mean, many attacks come through the browser, of which your computer can be severely compromised. What I meant by torrenting was that you could go to sites like thepiratebay.com or extratorrent.cc and download whatever movies or content you want to see. Using AirVPN, this is possible, as you'll be protected. You'd need a torrent client, such as qBittorent and to do some reading about it. It's called "piracy" by the pessimists, but "file-sharing" by the optimists . It's just an alternative, so that your VPN sub isn't wasted just because Netflix decides to block paying customers. This way, you won't need Netflix at all, but can instead watch things for free. The downside is that the quality of the downloads isn't always that high (initially at least, for new releases) and that there's a potentially higher risk of malware if you're not careful.
  3. Bitdefender should have an exclusion list that you can simply add airvpn.exe, deluge.exe & openvpn.exe to - have you checked? It's not always necessary though. You can also check the port on Airs site - the TCP test. Sometimes it'll work. Try and see if you can download some torrent - such as a Linux distro like Ubuntu. No worries about newb questions or whatever.
  4. Hello! I haven't heard of any plans for that. You might have more luck if you submit a support ticket; although honestly I don't expect a new Japanese server anytime soon. You can check the lower half of my new user guide, where there's a list of threads about server locations . Sent to you from me with datalove
  5. Hello! At least officially they got raided . As for the OP, "yes" it's "possible". But that doesn't mean it's likely to occur in the near future. Maybe you can submit a support ticket to ask if there's any plans for server expansion in your area of interest. However Russia most likely isn't going to be there, as Air is very picky about server locations; especially in terms of security and censorship. Sent to you from me with datalove
  6. Hello! You need to forward the port your torrent client is using, in the Air client Area . As well as making sure your firewall isn't blocking anything. Sent to you from me with datalove
  7. WFP is windows filtering platform, instead of windows firewall, so yes. Although of course local variations in hardware and software always plays a part haha . It's worth a try. Sent to you from me with datalove
  8. Hello! You either need to uninstall Norton or try adding airvpn and open.exe to Nortons exception list. Although I'd just download the Experimental version of the Eddie client instead, as it handles firewalling differently and should thus fix the problem. You can check my guide if you don't know where to find the Beta version. Sent to you from me with datalove
  9. Well I was assuming you were using Airs client, since it's an excellent client. NL is only available if you use Airs client, yes. I don't see a good reason to use the OpenVPN client much - Airs client is FOSS software, has been around for a while, is constantly being updated, has a huge amount of features and customizeability and really offers a lot which most other VPNs struggle to compete with. The experimental version of the client also offers more ways of dealing with IPv6 and features more ways to manage Windows related firewall issues. With NL on, you avoid many kinds of leaks, if the client doesn't already do so when it's disabled. I'm surprised that you're surprised that the tests passed actually - it could sound like you didn't think Airs software could manage that. I think your DNS issues are due to how Windows 10 handles DNS, which is/was said to be quite poor.
  10. Hello! In the Eddie Beta you can check a box called "Start Minimized" and I think that's what you're looking for.
  11. Hello! Welcome to AirVPN. I think that's the first time I've seen a new user call Air "simple", haha. 1 - No. Air is the silver-tipped stake that pierces the blood-sucking vampire hearts of the anti-P2P organisations, lol. Air even disowned ICANN because (long story short) they suck. 2 - What Air is doing, is making things *transparent* to you. It's pretty inevitable that either Air or their program see things like your IP when you're using their service. What you should be worried about is: If they're honest about this happening.What their policy is about it.If they have a history of dishonesty and/or selling out their customers.The answers to those would be: yes, they're very forceful about data-protection and take a variety of measures to ensure this and are amongst the most highly rated VPNs out there. It's just the same as they're very honest about their server infrastructure and stats about those; which you'd be hard-pressed to find in most other VPNs, the saying goes. Transparency = good. Air fully allows P2P, because it doesn't discriminate against any protocols. Also, Air is a "logless" VPN, so they presumably don't have a lot of stuff to give authorities anyway. In addition, they turn down DMCA requests if they get them. In fact, I can imagine Air Staff printing out the DMCA requests they get from various toxic organisations and use it to light their campfires when they go camping in the beautiful Italian wilderness, lol ;D. Besides, Air is super serious about security, which you'd know, if you took a look around these forums . So it's hard to imagine them easily falling prey to any P2P-related issues. If you're super concerned, you should look into using more than 1 VPN and/or using Bitcoins and other measures to mask yourself. You can check my guide if you want answers to a variety of other questions as well; including security ones.
  12. Eddie Beta really struggles with changing servers for me. I have to actually disable Ethernet 2 and enable it again, to make it connect, because the interface hacks aren't working. It works fine once it gets connected however. I'm not using Network Lock either, although when I do, I do usually run into problems with this Beta - stuff about not being able to find the default gateway or something. At least Check Tunnel & DNS routes are working. This is on Windows 8.1 64-bit. . 2016.09.29 20:07:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 20:07:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.29 20:07:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 20:07:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.29 20:08:04 - Updating systems & servers data ... . 2016.09.29 20:08:05 - Systems & servers data update completed . 2016.09.29 20:18:07 - Updating systems & servers data ... . 2016.09.29 20:18:08 - Systems & servers data update completed . 2016.09.29 20:28:10 - Updating systems & servers data ... . 2016.09.29 20:28:14 - Systems & servers data update completed . 2016.09.29 20:38:16 - Updating systems & servers data ... . 2016.09.29 20:38:17 - Systems & servers data update completed . 2016.09.29 20:48:19 - Updating systems & servers data ... . 2016.09.29 20:48:20 - Systems & servers data update completed . 2016.09.29 20:58:21 - Updating systems & servers data ... . 2016.09.29 20:58:21 - Systems & servers data update completed . 2016.09.29 21:07:44 - OpenVPN > TLS: soft reset sec=0 bytes=141928170/0 pkts=194136/0 . 2016.09.29 21:07:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.29 21:07:44 - OpenVPN > Validating certificate key usage . 2016.09.29 21:07:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.29 21:07:44 - OpenVPN > VERIFY KU OK . 2016.09.29 21:07:44 - OpenVPN > Validating certificate extended key usage . 2016.09.29 21:07:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.29 21:07:44 - OpenVPN > VERIFY EKU OK . 2016.09.29 21:07:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.29 21:07:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.29 21:07:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 21:07:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.29 21:07:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 21:07:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.29 21:08:23 - Updating systems & servers data ... . 2016.09.29 21:08:23 - Systems & servers data update completed . 2016.09.29 21:18:26 - Updating systems & servers data ... . 2016.09.29 21:18:26 - Systems & servers data update completed . 2016.09.29 21:28:29 - Updating systems & servers data ... . 2016.09.29 21:28:29 - Systems & servers data update completed . 2016.09.29 21:38:31 - Updating systems & servers data ... . 2016.09.29 21:38:32 - Systems & servers data update completed . 2016.09.29 21:48:33 - Updating systems & servers data ... . 2016.09.29 21:48:34 - Systems & servers data update completed . 2016.09.29 21:58:36 - Updating systems & servers data ... . 2016.09.29 21:58:36 - Systems & servers data update completed . 2016.09.29 22:07:44 - OpenVPN > TLS: soft reset sec=0 bytes=127273410/0 pkts=186931/0 . 2016.09.29 22:07:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.29 22:07:44 - OpenVPN > Validating certificate key usage . 2016.09.29 22:07:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.29 22:07:44 - OpenVPN > VERIFY KU OK . 2016.09.29 22:07:44 - OpenVPN > Validating certificate extended key usage . 2016.09.29 22:07:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.29 22:07:44 - OpenVPN > VERIFY EKU OK . 2016.09.29 22:07:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.29 22:07:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.29 22:07:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 22:07:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.29 22:07:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 22:07:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.29 22:08:39 - Updating systems & servers data ... . 2016.09.29 22:08:39 - Systems & servers data update completed . 2016.09.29 22:18:42 - Updating systems & servers data ... . 2016.09.29 22:18:42 - Systems & servers data update completed . 2016.09.29 22:28:45 - Updating systems & servers data ... . 2016.09.29 22:28:45 - Systems & servers data update completed . 2016.09.29 22:38:47 - Updating systems & servers data ... . 2016.09.29 22:38:48 - Systems & servers data update completed . 2016.09.29 22:48:50 - Updating systems & servers data ... . 2016.09.29 22:48:51 - Systems & servers data update completed . 2016.09.29 22:58:53 - Updating systems & servers data ... . 2016.09.29 22:58:54 - Systems & servers data update completed . 2016.09.29 23:07:44 - OpenVPN > TLS: soft reset sec=0 bytes=181344205/0 pkts=224476/0 . 2016.09.29 23:07:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.29 23:07:44 - OpenVPN > Validating certificate key usage . 2016.09.29 23:07:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.29 23:07:44 - OpenVPN > VERIFY KU OK . 2016.09.29 23:07:44 - OpenVPN > Validating certificate extended key usage . 2016.09.29 23:07:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.29 23:07:44 - OpenVPN > VERIFY EKU OK . 2016.09.29 23:07:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.29 23:07:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.29 23:07:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 23:07:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.29 23:07:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.29 23:07:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.29 23:08:56 - Updating systems & servers data ... . 2016.09.29 23:08:57 - Systems & servers data update completed . 2016.09.29 23:18:59 - Updating systems & servers data ... . 2016.09.29 23:18:59 - Systems & servers data update completed . 2016.09.29 23:29:02 - Updating systems & servers data ... . 2016.09.29 23:29:02 - Systems & servers data update completed . 2016.09.29 23:39:05 - Updating systems & servers data ... . 2016.09.29 23:39:05 - Systems & servers data update completed . 2016.09.29 23:49:07 - Updating systems & servers data ... . 2016.09.29 23:49:08 - Systems & servers data update completed . 2016.09.29 23:59:09 - Updating systems & servers data ... . 2016.09.29 23:59:09 - Systems & servers data update completed I 2016.09.30 00:07:44 - Renewing TLS key . 2016.09.30 00:07:44 - OpenVPN > TLS: tls_process: killed expiring key . 2016.09.30 00:07:45 - OpenVPN > TLS: soft reset sec=0 bytes=123098694/0 pkts=163290/0 . 2016.09.30 00:07:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 00:07:45 - OpenVPN > Validating certificate key usage . 2016.09.30 00:07:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 00:07:45 - OpenVPN > VERIFY KU OK . 2016.09.30 00:07:45 - OpenVPN > Validating certificate extended key usage . 2016.09.30 00:07:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 00:07:45 - OpenVPN > VERIFY EKU OK . 2016.09.30 00:07:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 00:07:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 00:07:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 00:07:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 00:07:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 00:07:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 00:09:10 - Updating systems & servers data ... . 2016.09.30 00:09:11 - Systems & servers data update completed . 2016.09.30 00:19:12 - Updating systems & servers data ... . 2016.09.30 00:19:13 - Systems & servers data update completed . 2016.09.30 00:29:15 - Updating systems & servers data ... . 2016.09.30 00:29:16 - Systems & servers data update completed . 2016.09.30 00:39:18 - Updating systems & servers data ... . 2016.09.30 00:39:19 - Systems & servers data update completed . 2016.09.30 00:49:21 - Updating systems & servers data ... . 2016.09.30 00:49:22 - Systems & servers data update completed . 2016.09.30 00:59:24 - Updating systems & servers data ... . 2016.09.30 00:59:24 - Systems & servers data update completed . 2016.09.30 01:07:45 - OpenVPN > TLS: soft reset sec=0 bytes=93039120/0 pkts=152931/0 . 2016.09.30 01:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 01:07:47 - OpenVPN > Validating certificate key usage . 2016.09.30 01:07:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 01:07:47 - OpenVPN > VERIFY KU OK . 2016.09.30 01:07:47 - OpenVPN > Validating certificate extended key usage . 2016.09.30 01:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 01:07:47 - OpenVPN > VERIFY EKU OK . 2016.09.30 01:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 01:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 01:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 01:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 01:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 01:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 01:09:27 - Updating systems & servers data ... . 2016.09.30 01:09:27 - Systems & servers data update completed . 2016.09.30 01:19:29 - Updating systems & servers data ... . 2016.09.30 01:19:30 - Systems & servers data update completed . 2016.09.30 01:29:31 - Updating systems & servers data ... . 2016.09.30 01:29:31 - Systems & servers data update completed . 2016.09.30 01:39:32 - Updating systems & servers data ... . 2016.09.30 01:39:33 - Systems & servers data update completed . 2016.09.30 01:49:34 - Updating systems & servers data ... . 2016.09.30 01:49:35 - Systems & servers data update completed . 2016.09.30 01:59:37 - Updating systems & servers data ... . 2016.09.30 01:59:38 - Systems & servers data update completed I 2016.09.30 02:07:45 - Renewing TLS key . 2016.09.30 02:07:45 - OpenVPN > TLS: tls_process: killed expiring key . 2016.09.30 02:07:47 - OpenVPN > TLS: soft reset sec=0 bytes=103286547/0 pkts=151960/0 . 2016.09.30 02:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 02:07:47 - OpenVPN > Validating certificate key usage . 2016.09.30 02:07:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 02:07:47 - OpenVPN > VERIFY KU OK . 2016.09.30 02:07:47 - OpenVPN > Validating certificate extended key usage . 2016.09.30 02:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 02:07:47 - OpenVPN > VERIFY EKU OK . 2016.09.30 02:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 02:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 02:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 02:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 02:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 02:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 02:09:40 - Updating systems & servers data ... . 2016.09.30 02:09:41 - Systems & servers data update completed . 2016.09.30 02:19:43 - Updating systems & servers data ... . 2016.09.30 02:19:44 - Systems & servers data update completed . 2016.09.30 02:29:46 - Updating systems & servers data ... . 2016.09.30 02:29:47 - Systems & servers data update completed . 2016.09.30 02:39:49 - Updating systems & servers data ... . 2016.09.30 02:39:50 - Systems & servers data update completed . 2016.09.30 02:49:51 - Updating systems & servers data ... . 2016.09.30 02:49:52 - Systems & servers data update completed . 2016.09.30 02:59:53 - Updating systems & servers data ... . 2016.09.30 02:59:54 - Systems & servers data update completed . 2016.09.30 03:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 03:07:47 - OpenVPN > Validating certificate key usage . 2016.09.30 03:07:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 03:07:47 - OpenVPN > VERIFY KU OK . 2016.09.30 03:07:47 - OpenVPN > Validating certificate extended key usage . 2016.09.30 03:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 03:07:47 - OpenVPN > VERIFY EKU OK . 2016.09.30 03:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 03:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 03:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 03:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 03:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 03:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 03:09:54 - Updating systems & servers data ... . 2016.09.30 03:09:55 - Systems & servers data update completed . 2016.09.30 03:19:56 - Updating systems & servers data ... . 2016.09.30 03:19:56 - Systems & servers data update completed . 2016.09.30 03:29:57 - Updating systems & servers data ... . 2016.09.30 03:29:58 - Systems & servers data update completed . 2016.09.30 03:39:59 - Updating systems & servers data ... . 2016.09.30 03:39:59 - Systems & servers data update completed . 2016.09.30 03:50:00 - Updating systems & servers data ... . 2016.09.30 03:50:00 - Systems & servers data update completed . 2016.09.30 04:00:02 - Updating systems & servers data ... . 2016.09.30 04:00:02 - Systems & servers data update completed . 2016.09.30 04:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 04:07:47 - OpenVPN > Validating certificate key usage . 2016.09.30 04:07:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 04:07:47 - OpenVPN > VERIFY KU OK . 2016.09.30 04:07:47 - OpenVPN > Validating certificate extended key usage . 2016.09.30 04:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 04:07:47 - OpenVPN > VERIFY EKU OK . 2016.09.30 04:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 04:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 04:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 04:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 04:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 04:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 04:10:03 - Updating systems & servers data ... . 2016.09.30 04:10:03 - Systems & servers data update completed . 2016.09.30 04:20:05 - Updating systems & servers data ... . 2016.09.30 04:20:05 - Systems & servers data update completed . 2016.09.30 04:30:07 - Updating systems & servers data ... . 2016.09.30 04:30:07 - Systems & servers data update completed . 2016.09.30 04:40:08 - Updating systems & servers data ... . 2016.09.30 04:40:08 - Systems & servers data update completed . 2016.09.30 04:50:11 - Updating systems & servers data ... . 2016.09.30 04:50:11 - Systems & servers data update completed . 2016.09.30 05:00:14 - Updating systems & servers data ... . 2016.09.30 05:00:14 - Systems & servers data update completed I 2016.09.30 05:07:46 - Renewing TLS key . 2016.09.30 05:07:46 - OpenVPN > TLS: tls_process: killed expiring key . 2016.09.30 05:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 05:07:47 - OpenVPN > Validating certificate key usage . 2016.09.30 05:07:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 05:07:47 - OpenVPN > VERIFY KU OK . 2016.09.30 05:07:47 - OpenVPN > Validating certificate extended key usage . 2016.09.30 05:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 05:07:47 - OpenVPN > VERIFY EKU OK . 2016.09.30 05:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 05:07:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 05:07:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 05:07:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 05:07:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 05:07:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 05:10:17 - Updating systems & servers data ... . 2016.09.30 05:10:17 - Systems & servers data update completed . 2016.09.30 05:20:19 - Updating systems & servers data ... . 2016.09.30 05:20:20 - Systems & servers data update completed . 2016.09.30 05:30:22 - Updating systems & servers data ... . 2016.09.30 05:30:22 - Systems & servers data update completed . 2016.09.30 05:40:25 - Updating systems & servers data ... . 2016.09.30 05:40:25 - Systems & servers data update completed . 2016.09.30 05:50:27 - Updating systems & servers data ... . 2016.09.30 05:50:28 - Systems & servers data update completed . 2016.09.30 05:56:05 - OpenVPN > TUN/TAP I/O operation aborted, restarting . 2016.09.30 05:56:05 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.162.180 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 05:56:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 05:56:05 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 W 2016.09.30 05:56:05 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 . 2016.09.30 05:56:05 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.09.30 05:56:05 - OpenVPN > Route deletion fallback to route.exe . 2016.09.30 05:56:05 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2016.09.30 05:56:05 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 W 2016.09.30 05:56:05 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1 . 2016.09.30 14:41:42 - OpenVPN > Route deletion via IPAPI failed [adaptive] . 2016.09.30 14:41:42 - OpenVPN > Route deletion fallback to route.exe . 2016.09.30 14:41:42 - OpenVPN > env_block: add PATH=C:\windows\System32;C:\windows;C:\windows\System32\Wbem . 2016.09.30 14:41:42 - OpenVPN > Closing TUN/TAP interface . 2016.09.30 14:41:42 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting . 2016.09.30 14:41:42 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.09.30 14:41:42 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.09.30 14:41:42 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.09.30 14:41:42 - OpenVPN > Restart pause, 10 second(s) . 2016.09.30 14:41:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 14:41:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.09.30 14:41:42 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 14:41:42 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.180:443 ! 2016.09.30 14:41:42 - Disconnecting . 2016.09.30 14:41:42 - Management - Send 'signal SIGTERM' . 2016.09.30 14:41:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.09.30 14:41:42 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 14:41:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.180:443, sid=5e9c04bd 0c7fa0cf . 2016.09.30 14:41:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 14:41:43 - OpenVPN > Validating certificate key usage . 2016.09.30 14:41:43 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 14:41:43 - OpenVPN > VERIFY KU OK . 2016.09.30 14:41:43 - OpenVPN > Validating certificate extended key usage . 2016.09.30 14:41:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 14:41:43 - OpenVPN > VERIFY EKU OK . 2016.09.30 14:41:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 14:41:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 14:41:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 14:41:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 14:41:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.180:443 . 2016.09.30 14:41:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.30 14:41:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.09.30 14:41:47 - Connection terminated. I 2016.09.30 14:41:47 - DNS leak protection with packet filtering disabled. I 2016.09.30 14:41:54 - Checking authorization ... ! 2016.09.30 14:41:54 - Connecting to Hassaleh (Netherlands, Alblasserdam) . 2016.09.30 14:41:55 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.09.30 14:41:55 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.09.30 14:41:55 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.09.30 14:41:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 14:41:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 14:41:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.09.30 14:41:55 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 14:41:55 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.39:443 . 2016.09.30 14:41:55 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.39:443, sid=b697ed81 2127c08e . 2016.09.30 14:41:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 14:41:55 - OpenVPN > Validating certificate key usage . 2016.09.30 14:41:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 14:41:55 - OpenVPN > VERIFY KU OK . 2016.09.30 14:41:55 - OpenVPN > Validating certificate extended key usage . 2016.09.30 14:41:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 14:41:55 - OpenVPN > VERIFY EKU OK . 2016.09.30 14:41:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 14:41:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 14:41:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 14:41:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 14:41:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 14:41:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.39:443 . 2016.09.30 14:41:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.30 14:41:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.138 255.255.0.0' . 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.09.30 14:41:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.09.30 14:41:57 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af . 2016.09.30 14:41:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.09.30 14:41:57 - OpenVPN > open_tun, tt->ipv6=0 . 2016.09.30 14:41:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap . 2016.09.30 14:41:57 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.09.30 14:41:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.138/255.255.0.0 [sUCCEEDED] . 2016.09.30 14:41:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.138/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.09.30 14:41:57 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} . 2016.09.30 14:42:02 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 14:42:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 14:42:02 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 14:42:04 - Updating systems & servers data ... . 2016.09.30 14:42:04 - Systems & servers data update completed . 2016.09.30 14:42:07 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.09.30 14:42:07 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.161.39 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 14:42:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 14:42:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 14:42:07 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 14:42:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 14:42:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 14:42:07 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 14:42:07 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 14:42:07 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 14:42:07 - Starting Management Interface . 2016.09.30 14:42:07 - OpenVPN > Initialization Sequence Completed I 2016.09.30 14:42:07 - DNS leak protection with packet filtering enabled. I 2016.09.30 14:42:07 - Flushing DNS I 2016.09.30 14:42:08 - Checking route I 2016.09.30 14:42:08 - Checking DNS ! 2016.09.30 14:42:08 - Connected. . 2016.09.30 14:42:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.09.30 14:42:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.09.30 14:52:07 - Updating systems & servers data ... . 2016.09.30 14:52:07 - Systems & servers data update completed . 2016.09.30 15:02:10 - Updating systems & servers data ... . 2016.09.30 15:02:10 - Systems & servers data update completed . 2016.09.30 15:12:13 - Updating systems & servers data ... . 2016.09.30 15:12:13 - Systems & servers data update completed . 2016.09.30 15:22:16 - Updating systems & servers data ... . 2016.09.30 15:22:16 - Systems & servers data update completed . 2016.09.30 15:32:19 - Updating systems & servers data ... . 2016.09.30 15:32:19 - Systems & servers data update completed . 2016.09.30 15:41:55 - OpenVPN > TLS: soft reset sec=0 bytes=27746944/0 pkts=35637/0 . 2016.09.30 15:41:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 15:41:55 - OpenVPN > Validating certificate key usage . 2016.09.30 15:41:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 15:41:55 - OpenVPN > VERIFY KU OK . 2016.09.30 15:41:55 - OpenVPN > Validating certificate extended key usage . 2016.09.30 15:41:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 15:41:55 - OpenVPN > VERIFY EKU OK . 2016.09.30 15:41:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 15:41:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 15:41:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 15:41:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 15:41:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 15:41:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 15:42:22 - Updating systems & servers data ... . 2016.09.30 15:42:22 - Systems & servers data update completed . 2016.09.30 15:52:25 - Updating systems & servers data ... . 2016.09.30 15:52:25 - Systems & servers data update completed . 2016.09.30 16:02:28 - Updating systems & servers data ... . 2016.09.30 16:02:28 - Systems & servers data update completed ! 2016.09.30 16:07:18 - Disconnecting . 2016.09.30 16:07:18 - Management - Send 'signal SIGTERM' . 2016.09.30 16:07:18 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.09.30 16:07:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 16:07:23 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.161.39 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 16:07:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:07:23 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:07:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:07:23 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:07:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:07:23 - OpenVPN > Closing TUN/TAP interface . 2016.09.30 16:07:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.09.30 16:07:23 - Connection terminated. I 2016.09.30 16:07:23 - DNS leak protection with packet filtering disabled. I 2016.09.30 16:07:26 - Checking authorization ... ! 2016.09.30 16:07:26 - Connecting to Jabbah (Netherlands, Alblasserdam) . 2016.09.30 16:07:26 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.09.30 16:07:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.09.30 16:07:26 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.09.30 16:07:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 16:07:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 16:07:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:07:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:07:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.09.30 16:07:26 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 16:07:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.108:443 . 2016.09.30 16:07:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.108:443, sid=323c8b75 346037e7 . 2016.09.30 16:07:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 16:07:26 - OpenVPN > Validating certificate key usage . 2016.09.30 16:07:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 16:07:26 - OpenVPN > VERIFY KU OK . 2016.09.30 16:07:26 - OpenVPN > Validating certificate extended key usage . 2016.09.30 16:07:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 16:07:26 - OpenVPN > VERIFY EKU OK . 2016.09.30 16:07:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 16:07:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:07:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:07:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:07:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:07:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 16:07:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.108:443 . 2016.09.30 16:07:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.30 16:07:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.55.181 255.255.0.0' . 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.09.30 16:07:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.09.30 16:07:29 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af . 2016.09.30 16:07:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.09.30 16:07:29 - OpenVPN > open_tun, tt->ipv6=0 . 2016.09.30 16:07:29 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap . 2016.09.30 16:07:29 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.09.30 16:07:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.55.181/255.255.0.0 [sUCCEEDED] . 2016.09.30 16:07:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.55.181/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.09.30 16:07:29 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} . 2016.09.30 16:07:34 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:34 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:39 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:39 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:40 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:41 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:42 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:44 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:45 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:45 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:46 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:47 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:47 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:48 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:49 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:49 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:50 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:50 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:51 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:51 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:53 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:54 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:55 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:56 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:56 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:56 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:57 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:57 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:57 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:58 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:59 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:07:59 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:07:59 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:07:59 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:00 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:00 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:01 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:01 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:01 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:02 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:02 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:02 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:03 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:03 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:03 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:04 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:04 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.162.108 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 16:08:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:08:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:08:04 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:08:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:08:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:08:04 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:08:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:08:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:08:04 - OpenVPN > SYSTEM ROUTING TABLE . 2016.09.30 16:08:04 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.0.1 p=0 i=8 t=4 pr=3 a=522062 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 10.4.0.0 255.255.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5160 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 10.4.64.138 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5160 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 10.4.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5160 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 192.168.0.0 255.255.255.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=522062 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 192.168.0.20 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522062 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 192.168.0.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522062 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 213.152.162.108 255.255.255.255 192.168.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=782042 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 224.0.0.0 240.0.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5182 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782161 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=782042 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > 255.255.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5182 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:04 - OpenVPN > SYSTEM ADAPTER LIST . 2016.09.30 16:08:04 - OpenVPN > TAP-Windows Adapter V9 . 2016.09.30 16:08:04 - OpenVPN > Index = 11 . 2016.09.30 16:08:04 - OpenVPN > GUID = {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} . 2016.09.30 16:08:04 - OpenVPN > IP = 10.4.64.138/255.255.0.0 . 2016.09.30 16:08:04 - OpenVPN > MAC = 00:ff:be:09:92:a2 . 2016.09.30 16:08:04 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > DHCP SERV = 10.4.255.254/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 14:42:04 2016 . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE EXPIRES = Sat Sep 30 14:42:04 2017 . 2016.09.30 16:08:04 - OpenVPN > DNS SERV = 10.4.0.1/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > Microsoft Hosted Network Virtual Adapter . 2016.09.30 16:08:04 - OpenVPN > Index = 10 . 2016.09.30 16:08:04 - OpenVPN > GUID = {844568C3-14DF-41E6-833A-81856D3B6138} . 2016.09.30 16:08:04 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.09.30 16:08:04 - OpenVPN > MAC = a2:88:69:9d:df:af . 2016.09.30 16:08:04 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > DHCP SERV = . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 16:08:04 2016 . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE EXPIRES = Fri Sep 30 16:08:04 2016 . 2016.09.30 16:08:04 - OpenVPN > DNS SERV = . 2016.09.30 16:08:04 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter . 2016.09.30 16:08:04 - OpenVPN > Index = 9 . 2016.09.30 16:08:04 - OpenVPN > GUID = {2D182CF7-D6F3-4AA0-883E-7E68BB203082} . 2016.09.30 16:08:04 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.09.30 16:08:04 - OpenVPN > MAC = a0:88:69:9d:df:b0 . 2016.09.30 16:08:04 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > DHCP SERV = . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 16:08:04 2016 . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE EXPIRES = Fri Sep 30 16:08:04 2016 . 2016.09.30 16:08:04 - OpenVPN > DNS SERV = . 2016.09.30 16:08:04 - OpenVPN > Intel® Dual Band Wireless-AC 3160 . 2016.09.30 16:08:04 - OpenVPN > Index = 8 . 2016.09.30 16:08:04 - OpenVPN > GUID = {6B6DDE14-4361-45B9-8A2D-2C1900101038} . 2016.09.30 16:08:04 - OpenVPN > IP = 192.168.0.20/255.255.255.0 . 2016.09.30 16:08:04 - OpenVPN > MAC = a0:88:69:9d:df:af . 2016.09.30 16:08:04 - OpenVPN > GATEWAY = 192.168.0.1/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > DHCP SERV = 192.168.0.1/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 14:41:46 2016 . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE EXPIRES = Sat Oct 01 14:41:46 2016 . 2016.09.30 16:08:04 - OpenVPN > DNS SERV = 194.168.4.100/255.255.255.255 194.168.8.100/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > Realtek PCIe GBE Family Controller . 2016.09.30 16:08:04 - OpenVPN > Index = 3 . 2016.09.30 16:08:04 - OpenVPN > GUID = {53B8A3BA-3F04-479E-B626-2647DA5C2E82} . 2016.09.30 16:08:04 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.09.30 16:08:04 - OpenVPN > MAC = f8:a9:63:47:09:c1 . 2016.09.30 16:08:04 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > DHCP SERV = . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 16:08:04 2016 . 2016.09.30 16:08:04 - OpenVPN > DHCP LEASE EXPIRES = Fri Sep 30 16:08:04 2016 . 2016.09.30 16:08:04 - OpenVPN > PRI WINS = 150.100.0.10/255.255.255.255 . 2016.09.30 16:08:04 - OpenVPN > SEC WINS = . 2016.09.30 16:08:04 - OpenVPN > DNS SERV = . 2016.09.30 16:08:04 - Starting Management Interface . 2016.09.30 16:08:04 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv ) I 2016.09.30 16:08:04 - DNS leak protection with packet filtering enabled. I 2016.09.30 16:08:04 - Flushing DNS . 2016.09.30 16:08:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.09.30 16:08:04 - Disconnecting . 2016.09.30 16:08:04 - Management - Send 'signal SIGTERM' . 2016.09.30 16:08:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.09.30 16:08:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.09.30 16:08:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 16:08:09 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.162.108 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 16:08:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:08:09 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:08:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:08:09 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:08:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:08:09 - OpenVPN > Closing TUN/TAP interface . 2016.09.30 16:08:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.09.30 16:08:09 - Connection terminated. I 2016.09.30 16:08:09 - DNS leak protection with packet filtering disabled. I 2016.09.30 16:08:18 - Checking authorization ... ! 2016.09.30 16:08:19 - Connecting to Hyadum (Netherlands, Alblasserdam) . 2016.09.30 16:08:19 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.09.30 16:08:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.09.30 16:08:19 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.09.30 16:08:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 16:08:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 16:08:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:08:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:08:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.09.30 16:08:19 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 16:08:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.34:443 . 2016.09.30 16:08:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.34:443, sid=1b679b7f 2263fd39 . 2016.09.30 16:08:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 16:08:19 - OpenVPN > Validating certificate key usage . 2016.09.30 16:08:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 16:08:19 - OpenVPN > VERIFY KU OK . 2016.09.30 16:08:19 - OpenVPN > Validating certificate extended key usage . 2016.09.30 16:08:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 16:08:19 - OpenVPN > VERIFY EKU OK . 2016.09.30 16:08:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 16:08:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:08:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:08:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:08:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:08:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 16:08:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.34:443 . 2016.09.30 16:08:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.30 16:08:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.99 255.255.0.0' . 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.09.30 16:08:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.09.30 16:08:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af . 2016.09.30 16:08:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.09.30 16:08:22 - OpenVPN > open_tun, tt->ipv6=0 . 2016.09.30 16:08:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap . 2016.09.30 16:08:22 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.09.30 16:08:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.99/255.255.0.0 [sUCCEEDED] . 2016.09.30 16:08:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.99/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.09.30 16:08:22 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} . 2016.09.30 16:08:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:26 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:31 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:31 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:31 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:32 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:32 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:32 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:33 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:33 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:33 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:34 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:34 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:34 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:35 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:35 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:35 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:36 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:36 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:36 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:37 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:38 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:39 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:39 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:39 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:40 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:40 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:40 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:41 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:42 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:43 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:43 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:43 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:44 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:46 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:46 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:46 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:47 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:47 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:48 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:49 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:49 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:50 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:50 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:50 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:51 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:51 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:53 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:54 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:08:55 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:08:56 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:08:56 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.161.34 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 16:08:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:08:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:08:56 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:08:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:08:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:08:56 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:08:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:08:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:08:56 - OpenVPN > SYSTEM ROUTING TABLE . 2016.09.30 16:08:56 - OpenVPN > 0.0.0.0 0.0.0.0 192.168.0.1 p=0 i=8 t=4 pr=3 a=522115 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 0.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 10.4.0.0 255.255.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5212 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 10.4.64.138 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5212 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 10.4.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5212 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 128.0.0.0 128.0.0.0 10.4.0.1 p=0 i=11 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 192.168.0.0 255.255.255.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=522115 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 192.168.0.20 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522115 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 192.168.0.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=522115 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 213.152.161.34 255.255.255.255 192.168.0.1 p=0 i=8 t=4 pr=3 a=0 h=0 m=20/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 224.0.0.0 240.0.0.0 192.168.0.20 p=0 i=8 t=3 pr=2 a=782095 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 224.0.0.0 240.0.0.0 10.4.64.138 p=0 i=11 t=3 pr=2 a=5234 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=782214 h=0 m=306/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 255.255.255.255 255.255.255.255 192.168.0.20 p=0 i=8 t=3 pr=2 a=782095 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > 255.255.255.255 255.255.255.255 10.4.64.138 p=0 i=11 t=3 pr=2 a=5234 h=0 m=276/0/0/0/0 . 2016.09.30 16:08:56 - OpenVPN > SYSTEM ADAPTER LIST . 2016.09.30 16:08:56 - OpenVPN > TAP-Windows Adapter V9 . 2016.09.30 16:08:56 - OpenVPN > Index = 11 . 2016.09.30 16:08:56 - OpenVPN > GUID = {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} . 2016.09.30 16:08:56 - OpenVPN > IP = 10.4.64.138/255.255.0.0 . 2016.09.30 16:08:56 - OpenVPN > MAC = 00:ff:be:09:92:a2 . 2016.09.30 16:08:56 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > DHCP SERV = 10.4.255.254/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 14:42:04 2016 . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE EXPIRES = Sat Sep 30 14:42:04 2017 . 2016.09.30 16:08:56 - OpenVPN > DNS SERV = 10.4.0.1/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > Microsoft Hosted Network Virtual Adapter . 2016.09.30 16:08:56 - OpenVPN > Index = 10 . 2016.09.30 16:08:56 - OpenVPN > GUID = {844568C3-14DF-41E6-833A-81856D3B6138} . 2016.09.30 16:08:56 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.09.30 16:08:56 - OpenVPN > MAC = a2:88:69:9d:df:af . 2016.09.30 16:08:56 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > DHCP SERV = . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 16:08:56 2016 . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE EXPIRES = Fri Sep 30 16:08:56 2016 . 2016.09.30 16:08:56 - OpenVPN > DNS SERV = . 2016.09.30 16:08:56 - OpenVPN > Microsoft Wi-Fi Direct Virtual Adapter . 2016.09.30 16:08:56 - OpenVPN > Index = 9 . 2016.09.30 16:08:56 - OpenVPN > GUID = {2D182CF7-D6F3-4AA0-883E-7E68BB203082} . 2016.09.30 16:08:56 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.09.30 16:08:56 - OpenVPN > MAC = a0:88:69:9d:df:b0 . 2016.09.30 16:08:56 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > DHCP SERV = . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 16:08:56 2016 . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE EXPIRES = Fri Sep 30 16:08:56 2016 . 2016.09.30 16:08:56 - OpenVPN > DNS SERV = . 2016.09.30 16:08:56 - OpenVPN > Intel® Dual Band Wireless-AC 3160 . 2016.09.30 16:08:56 - OpenVPN > Index = 8 . 2016.09.30 16:08:56 - OpenVPN > GUID = {6B6DDE14-4361-45B9-8A2D-2C1900101038} . 2016.09.30 16:08:56 - OpenVPN > IP = 192.168.0.20/255.255.255.0 . 2016.09.30 16:08:56 - OpenVPN > MAC = a0:88:69:9d:df:af . 2016.09.30 16:08:56 - OpenVPN > GATEWAY = 192.168.0.1/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > DHCP SERV = 192.168.0.1/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 14:41:46 2016 . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE EXPIRES = Sat Oct 01 14:41:46 2016 . 2016.09.30 16:08:56 - OpenVPN > DNS SERV = 194.168.4.100/255.255.255.255 194.168.8.100/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > Realtek PCIe GBE Family Controller . 2016.09.30 16:08:56 - OpenVPN > Index = 3 . 2016.09.30 16:08:56 - OpenVPN > GUID = {53B8A3BA-3F04-479E-B626-2647DA5C2E82} . 2016.09.30 16:08:56 - OpenVPN > IP = 0.0.0.0/0.0.0.0 . 2016.09.30 16:08:56 - OpenVPN > MAC = f8:a9:63:47:09:c1 . 2016.09.30 16:08:56 - OpenVPN > GATEWAY = 0.0.0.0/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > DHCP SERV = . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE OBTAINED = Fri Sep 30 16:08:56 2016 . 2016.09.30 16:08:56 - OpenVPN > DHCP LEASE EXPIRES = Fri Sep 30 16:08:56 2016 . 2016.09.30 16:08:56 - OpenVPN > PRI WINS = 150.100.0.10/255.255.255.255 . 2016.09.30 16:08:56 - OpenVPN > SEC WINS = . 2016.09.30 16:08:56 - OpenVPN > DNS SERV = . 2016.09.30 16:08:56 - Starting Management Interface . 2016.09.30 16:08:56 - OpenVPN > Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv ) I 2016.09.30 16:08:56 - DNS leak protection with packet filtering enabled. I 2016.09.30 16:08:56 - Flushing DNS . 2016.09.30 16:08:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.09.30 16:08:57 - Disconnecting . 2016.09.30 16:08:57 - Management - Send 'signal SIGTERM' . 2016.09.30 16:08:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.09.30 16:08:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.09.30 16:08:57 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 16:09:02 - OpenVPN > C:\windows\system32\route.exe DELETE 213.152.161.34 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 16:09:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:09:02 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:09:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:09:02 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:09:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.09.30 16:09:02 - OpenVPN > Closing TUN/TAP interface . 2016.09.30 16:09:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.09.30 16:09:02 - Connection terminated. I 2016.09.30 16:09:02 - DNS leak protection with packet filtering disabled. I 2016.09.30 16:09:05 - Checking authorization ... ! 2016.09.30 16:09:05 - Connecting to Subra (Netherlands, Alblasserdam) . 2016.09.30 16:09:05 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.09.30 16:09:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.09.30 16:09:05 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.09.30 16:09:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 16:09:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 16:09:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.09.30 16:09:05 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 16:09:05 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443 . 2016.09.30 16:09:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=ee54dff3 4f01796e . 2016.09.30 16:09:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 16:09:05 - OpenVPN > Validating certificate key usage . 2016.09.30 16:09:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 16:09:05 - OpenVPN > VERIFY KU OK . 2016.09.30 16:09:05 - OpenVPN > Validating certificate extended key usage . 2016.09.30 16:09:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 16:09:05 - OpenVPN > VERIFY EKU OK . 2016.09.30 16:09:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 16:09:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:09:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:09:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 16:09:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443 . 2016.09.30 16:09:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.30 16:09:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.62.132 255.255.0.0' . 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.09.30 16:09:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.09.30 16:09:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af . 2016.09.30 16:09:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.09.30 16:09:07 - OpenVPN > open_tun, tt->ipv6=0 . 2016.09.30 16:09:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap . 2016.09.30 16:09:07 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.09.30 16:09:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.62.132/255.255.0.0 [sUCCEEDED] . 2016.09.30 16:09:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.62.132/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.09.30 16:09:07 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} . 2016.09.30 16:09:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:12 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:17 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:17 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:17 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:18 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:18 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:18 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:19 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:19 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:19 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:20 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:20 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:20 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:21 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:21 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:21 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:22 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:22 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:22 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:23 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:23 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:23 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:24 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:24 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:24 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:25 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:25 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:25 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:26 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:26 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:26 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:27 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:27 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:28 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:28 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:28 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:29 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.30 16:09:29 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.30 16:09:29 - Eddie Windows Interface Hack executed (Ethernet 2) . 2016.09.30 16:09:30 - OpenVPN > TUN/TAP I/O operation aborted, restarting . 2016.09.30 16:09:30 - OpenVPN > Closing TUN/TAP interface . 2016.09.30 16:09:30 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting . 2016.09.30 16:09:30 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.09.30 16:09:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.09.30 16:09:30 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.09.30 16:09:30 - OpenVPN > Restart pause, 10 second(s) ! 2016.09.30 16:09:30 - Disconnecting . 2016.09.30 16:09:30 - Connection terminated. I 2016.09.30 16:09:33 - Checking authorization ... ! 2016.09.30 16:09:33 - Connecting to Skat (Netherlands, Alblasserdam) . 2016.09.30 16:09:33 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.09.30 16:09:33 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2016.09.30 16:09:33 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.09.30 16:09:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 16:09:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 16:09:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2016.09.30 16:09:34 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 16:09:34 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.73:443 . 2016.09.30 16:09:34 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.73:443, sid=187a627a 2341ecac . 2016.09.30 16:09:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.30 16:09:34 - OpenVPN > Validating certificate key usage . 2016.09.30 16:09:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.30 16:09:34 - OpenVPN > VERIFY KU OK . 2016.09.30 16:09:34 - OpenVPN > Validating certificate extended key usage . 2016.09.30 16:09:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.30 16:09:34 - OpenVPN > VERIFY EKU OK . 2016.09.30 16:09:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.30 16:09:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:09:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.30 16:09:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 16:09:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.09.30 16:09:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.73:443 . 2016.09.30 16:09:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.30 16:09:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.242 255.255.0.0' . 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.09.30 16:09:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.09.30 16:09:36 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:88:69:9d:df:af . 2016.09.30 16:09:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.09.30 16:09:36 - OpenVPN > open_tun, tt->ipv6=0 . 2016.09.30 16:09:36 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BE0992A2-DAD5-4D63-AF1E-0713A909C21A}.tap . 2016.09.30 16:09:36 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.09.30 16:09:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.242/255.255.0.0 [sUCCEEDED] . 2016.09.30 16:09:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.242/255.255.0.0 on interface {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.09.30 16:09:36 - OpenVPN > Successful ARP Flush on interface [11] {BE0992A2-DAD5-4D63-AF1E-0713A909C21A} . 2016.09.30 16:09:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.09.30 16:09:41 - OpenVPN > C:\windows\system32\route.exe ADD 213.152.161.73 MASK 255.255.255.255 192.168.0.1 . 2016.09.30 16:09:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:09:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:09:41 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:09:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:09:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:09:41 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.09.30 16:09:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.09.30 16:09:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.30 16:09:41 - Starting Management Interface . 2016.09.30 16:09:41 - OpenVPN > Initialization Sequence Completed I 2016.09.30 16:09:41 - DNS leak protection with packet filtering enabled. I 2016.09.30 16:09:41 - Flushing DNS I 2016.09.30 16:09:41 - Checking route I 2016.09.30 16:09:42 - Checking DNS ! 2016.09.30 16:09:42 - Connected. . 2016.09.30 16:09:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.09.30 16:09:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info Is there anything I should be doing otherwise Staff? Thank you.
  13. Hello! Maybe you could try changing your TAP drivers to an earlier version and see if that works
  14. Hello! Personally, I recommend using qBittorent, both because it's open-source software and because I think it's possible to make it bind to the VPN interface, thus only using the VPN interface for torrenting, while this may not (yet) be possible in uTorrent as easily. As DA623 said, you ought to go to ipleak.net and see if you're leaking anything. Try the test torrent as well. However with Network Lock on, you won't be leaking WebRTC either, even though ipleak shows you how to disable it anyway. Remember to do some portforwarding, to forward the port that your torrent client uses, so that things go faster .
  15. Hello! Thanks for the headsup. If you want to browse threads though, then Tapatalk makes it very easy.
  16. Hello! Which client are you using? Maybe the experimental version would help you.
  17. Hello! Have you made sure that your firewall isn't blocking it and that qBittorent is set to not change or randomize the ports? Sent to you from me with datalove
  18. Updated: Two more bullet points added in the "Getting Started" section, regarding the new experimental/beta release client, where it is and why it's worth using. Especially for Linux users.The above includes pictures, to aid in finding out where to download the Beta version. Thanks Staff. Appropriate warning/info signs also added in some places.Added point regarding the new ipleak.net sub-forum, especially as there's been many recent posts about the errors on ipleak.Added point to Network Lock question, which mentions that WFP is the new standard in the Beta release.Added appropriate warning message in the "First Questions" section, in two of the questions, detailing why people shouldn't be alarmed if they get notices of having been "hacked".Added a link and explanation to two questions (first and last ones) in the "First Questions" section, linking to the discussion Air Staff had with the oneprivacyguy, in order to both raise awareness and help preserve it as an easy-to-find "permanent reminder", as Staff said. This will hopefully accomplish the following: Help Linux users out more and anyone else who's having odd problems with the current Stable. Lessen the amount of people asking where they can download the Beta version. Lessen the amount of people asking what's going on with ipleak.net, in the event of a problem or at least confine it to ipleaks own sub-forum. Make people aware both where they can find information on the Beta, but also that Air is constantly developing their software and isn't ignoring bugs. Avoiding other people responding with panic when online services tell them they've been "hacked" (due to changing VPN IPs). Provide a quick link to Airs Official replies to posts which suggest that Air is engaged in less-than honest or ideal forms of advertising/marketing, which Air isn't. Help future-proof the guide, in case I'm unexpectedly assassinated by the time the Beta turns into a Stable release.
  19. @hugomueller They could use things such as: Full logs from Eddie, so we can see how it operates for you. System logs (available if you click the lifebelt icon in the Eddie logs area) Other information on your system, such as if you use any third-party firewalls or software which might interfere. What you've tried, in order to fix it. Such as if it still persists, if you make Eddie use "Windows Firewall" instead of WFP, in the settings. Deeper description of the problem, such as what steps you took to make the problem occur, so that Air can try reproduce it. What exactly the problem *is*. Is it just an error in the logs for instance? Or does your PC go full-BSOD? Deeper descriptions, not just pictures.All with appropriate spoiler tags of course. There's lots you can do
  20. Yes, I'm using Tails 2.5 But where can I find AirVPN client 2.11? I only see 2.10 or earlier on the download page. Hello! It's under Other Versions>Experimental.
  21. It's also very much a case of who your ISP has the best connection to and thus physical location can matter less than one had hoped .
  22. Hello! I urge you to try speedtests from other places as well, in addition to the Air tests . I think it's hard to say what one should expect, when there's so many variables in everything from the quality of your ISP, to hardware used by you. Do remember that you can route things outside of the VPN tunnel too, if you require the full capacity of your line.
  23. Hello! Well, provided you're okay with the risks and it works, sure you can use it, why not. Especially if AirVPN can't get through to Netflix. Although I must say, perhaps you'd be better served with torrenting then, as that would really make use of your AirVPN sub. But I don't know what you mean with "contained within chrome" - because AirVPN is fine regardless; it just can't help you, if you choose to compromise your own system with less-than-honest software. Was there a particular kind of issue with AirVPN, which you had in mind? .
×
×
  • Create New...