Jump to content
Not connected, Your IP: 3.149.254.110

LZ1

Members2
  • Content Count

    2089
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    78

Everything posted by LZ1

  1. Hello ! I don't know if it'll help, but maybe this is relevant for you.
  2. Ha, I was just looking at your post. Are you using Putty or the SSH protocol? When you go to your "Preferences" and then Protocols, is it set to "Automatic"? Take a look at your TAP drivers too. On page 3 or so, there's links to the newest one as well. Are you using any 3rd party firewall or networking software otherwise?
  3. Did you try Automatic??
  4. Hello ! Would AirVPN & members be interested in supporting guifi.net? An open, free & neutral Telecommunications Network, which started out as a mesh-network run by 1 guy. I think that even if Air chose not to support it monetarily, it would still be very interesting for a VPN provider to provide advice and/or further support in other ways. But guifi strikes at the heart of AirVPNs hacktivist & activist roots as well. Maybe there could be a partnership between guifi.net & Air in the future? Like their users get 10% off of the price or something. Maybe there's a business opportunity there somewhere. The StoryGuifi was started when a man in Spain couldn't receive network access, due to one of the biggest Spanish ISPs, Telefonica, being sloppy/lazy/careless and/or just not interested in providing him a service. Due to them being a very large company and having an effective monopoly on networking, he decided to start his own business. It started out as just him using long-range directional wi-fi from government buildings to his home, to get access to the internet. But eventually it caught on and others wanted it too. So his network grew and now many many people rely on guifi to get access to the net. It also aligns nicely with the parts of Spain which want independence, that they have their own network, which they control. Once you read this description, I'm sure you'll find this is precisely the sort of thing Air can get behind: guifi.net is a Telecommunications Networks as a Commons. In guifi.net, users promote and invest in telecommunications infrastructure that ensures Internet quality access at a just price. guifi.net network is open, free and neutral to avoid restrictions on content and technology. Anyone can be a user of guifi.net, a network infrastructure that is part of a Commons. The network uses best available techologies, radio and optical fiber, with connections up to 1 Gbps and 10 Gbps Internet interconnections. In 2008, users founded guifi.net Foundation, which objective is work for Network as Commons, develping and applying an economic model basen on management infrastructure as a Commons Pool Resource and Collaborative Economy. guifi.net Foundation is a NGO for Development, a telecommunications operator ans Volunteer organitzation. Transform telecommunications sector. Improve capabilitis of Internet access. Guifi.net Network Terms of Use: You have the freedom to use the network for any purpose as long as you don’t harm the operation of the network itself, the rights of other users, or the principles of neutrality that allow contents and services to flow without deliberate interference. You have the right to understand the network and its components, and to share knowledge of its mechanisms and principles. You have the right to offer services and content to the network on your own terms. You have the right to join the network, and the obligation to extend this set of rights to anyone according to these same terms. Why Air Might LIke ItThe special thing about guifi is that it's an open, sometimes monetarily free network, which follows a lot of principles that Air would agree on; such as Net Neutrality. Many people, especially in rural areas, can't get online, because it's supposedly too costly to get them connected and let's be honest, who needs censorship or data caps to block people from having access, when there's simply no service at all? Just as the Air mission reads: "Circumvent censorship and any other barrier to seek, receive and impart information and ideas without interference and regardless of frontiers". But with guifi, everyone can get connected and it doesn't always cost money (from my reading). But even though this is currently only in Spain, just imagine if such initiatives could spread to other parts of the world! Many americans for instance, either don't get serviced by an ISP at all or have to live with very bad deals/terms. But with guifi, you get more for less. So in short: Open, neutral & unrestricted. Community-run & supported by paying customers and donations. Uses FOSS software & has a robust yet straightforward rulebook Helps people, both rural and non-rural alike, get access to the Internet Fair pricing. Especially compared to corporate ISPs such as Telefonica. Could spawn similar initiatives, which in the long-run, could ultimately help rid the world of greedy, slow, controlling & bad ISPs. Other Interesting Things Here you can see how their network expanded, in a short video. Here you can read a long review of it Please feel free to tell me what you think
  5. Hello ! You might not get much traction for that idea, because as the Staff will tell you (and it doubles as great advice for life, if you ever fancy being a hitman), that you must always kill Eddie with grace. Which is, via it's own menus. It has been a bug that bad things will happen if you don't and I can confirm that. But on a practical level, it's due to Eddie needing time to save and/or restore various settings, so that things work as intended afterwards and/or the next time Eddie is started. Network Lock is a good example of this, wherein it needs time to restore your firewall settings to their original settings. However they're seemingly working on a different implementation for how NL handles windows & firewalls, so you might get lucky in this respect. However I think there's also various interactions with the management portion of OpenVPN.exe that need to be communicated.
  6. It sounds like an oxymoron when you say "honest closed source program". Then based on what you said afterwards, it sounds like you're saying there's some people who reviewed the program and its code and found it to be fine, is this correct? I understand it as being a few people got access to the code. The problem is evidenced in your sentence: you have to rely on trust and that's simply not a very good assurance. It's true that if a program isn't open-source, it doesn't mean it's a *bad program* automatically, but it does mean the program, for one reason or another, doesn't let others view how it works. This, regardless of whether the intentions are good or not, is a vulnerability and to some, like the FSF, morally wrong and it therefore still qualifies as a bad program. It could be you're right and right now the program code is 100% benign. But it's exactly due to the closed nature of the code, that this won't matter, as the developer or whoever else has access, could simply add malicious code immediately afterwards and no one would be the wiser. So while I think it does sound like a nice program, filled with many lovely customization options, I cannot ever agree with its code philosophy - not in this day and age. Of course, it's "ok" to have closed source software, if that's what you choose, so this is something you're right about, as people have different use-cases, opinions, ideas and attitudes towards different things. Thanks for listing the things it does well. We should be careful not to get too off-topic .
  7. I would assume NL is still on. Now I*m not an expert or anything... But I would assume that if something went wrong with WPF, then NL would switch to using Windows Firewall, as it appears to have done now. I just turned NL on and it works. No errors.
  8. ^__^ No worries. Thanks to the always hard working Clodo and Air Staff too, even though I'm sure the problem isn't entirely fixed just yet
  9. Try go to Preferences>Advanced>Uncheck "WPF", click save and then click the Eddie Menu again, where Preferences are and click "Exit". Then restart and see if it works ^^. Because Staffs (kind) suggestion, didn't work for me either, but this did, after I played around with it.
  10. Hello ! I tried it and it's a cool little program . Well done. Thank you for putting it together.
  11. Well good luck with that. Which platform are you on by the way? The other day, a guy had severe speed/connection issues as well. He did a traceroute and we found it was probably his ISP or something such. Then he changed ports and it worked; even though you said you had tried "various" ports and such.
  12. Then please post your logs! The service is still well-worth it, as you'll see, if you have a little patience. But of course, Air doesn't claim to offer a service suitable for every kind of individual. Also, did you actually try the solutions posted?
  13. Hello ! If you're using Windows... Did you check Preferences>General>Minimize in tray icon. Isn't this what you want?
  14. Maybe that's due to Preferences>Advanced>DNS being set to AirVPN DNS. You could add your preferred DNS server to the whitelist.
  15. Hello ! It must be something on your end OP, whether your own PC or things like your ISP, because plenty of AirVPN users are getting great speeds. I noticed your OP said "Laps: 1", hopefully you did more than 1 lap. I assume you tried speedtest.net stuff too, with servers close to your location.
  16. Hello ! ​Welcome to AirVPN . You can use SSL on TCP port 443, under the Protocols tab if you want to hide the OpenVPN protocol, which signals that a VPN is in use ^^. But as giga said, then the encryption already hides what you're doing; just not that it's VPN traffic. Air also fully allows P2P and turns down DMCA notices as well, in case you're in doubt . The scenario of one standing out, is the case with PGP encryption I believe. You can also look into using AirVPN with Tor, to hide your general web browsing even more; just don't torrent while using Tor.
  17. Hello ! ​Welcome to AirVPN . ​Win10 can be tough to contain ^__^. It likes talking to its corporate master. I once met this guy who had contained it within a Qubes OS VM, with connections through Tor and all that. He just couldn't get it to be quiet, network-wise, so he got pretty annoyed at it haha.
  18. Hello ! ​ ​As the Staff hinted at, you have to understand that there's different kinds of cookies. Most are argueably for tracking, but there's others which let you log in to websites and it's these that Air uses :]. You should note that Air also doesn't use other tracking software that it could use, such as various Google or Facebook systems; instead it keeps it all in-house. Furthermore, they also comply with the European cookie directive, wherein they actually ask you if you accept that cookies are used here. It can be an annoyance, sure, but it shows that they do follow all the rules :]. I recommend that you take a look at various Browser extensions, to add further protection to your browser. Things like uBlock Origin or Privacy Badger.
  19. Good, so it should be some other problem, not a specific regression of 2.11.2 (good for 2.11.2 we mean!). Maybe it's just a DNS issue, unrelated to Network Lock, that you have since you used Eddie 2.10.3 (it had a bug for which under peculiar circumstances it did not restore properly previous DNS settings in Windows interfaces). So a plausible explanation is that you have the impression you have no connectivity, but in reality you have it. It's only that the system can't resolve names. Kind regards That is quite possible . I thought it was a feature, not a bug though, so I'm a happy customer ("network lock really works!!") lol. If I tried recreating the scenario and then pinged a website and got a response, would that prove it's probably a DNS issue, if I otherwise can't access websites? Please feel free to tell me if there's any other pieces of information I can add to this or my "Report" post. I'll try out 2.11.2 on Windows 8 as well, eventually.
  20. 2.10.3 and that was on both Windows 8 64-bit & 7 64-bit I think. ​I also just got 2.11.2 to connect again, on the Admin account, after many restarts. ​ ​Edit: I should add this is all happening of Home Editions of both OS's.
  21. Mmm, maybe I was unclear. I'm used to not being able to go online, until Eddie has started (we're talking about on system startup) and I assume this is due to NL. Since if Eddie doesn't start, then I can't go online, which I'm happy with. Does this make sense? Also, I wasn't being clear, I just meant to state it as a preference that I don't like the logo being greyed out and only highlighting on mouse-over, haha. Just in case, you know, Clodo is looking for design opinions! Hahaha. Thank you for replying so quickly. In case you didn't see it, I added another Edit to my "Report" post. Have a nice day
  22. Report TL;DR: I currently can't connect to a server at all, under a Standard account, ever since I tried Eddie on an Admin account. Tried setting Eddie to connect at startup & Windows startup, as well as to enable NL at startup. Eddie then doesn't start under a Standard account and browsing is possible, without protection, even when Network Lock was on previously and set to connect automatically, from the last session. However it starts up fine under an Admin account. After closing down the Admin account, restarting and then going back to a Standard account, Eddie won't start, but instead crashes by continously throwing an exception. This can be stopped if the reconnection attempts are cancelled Clean install of Win 7 64-bit. Client version: 2.11.2 . Here's the exception: Problem signature: Problem Event Name: CLR20r3 Problem Signature 01: airvpn.exe Problem Signature 02: 2.11.0.0 Problem Signature 03: 5793ef20 Problem Signature 04: Platforms.Windows Problem Signature 05: 2.11.0.0 Problem Signature 06: 5793ef18 Problem Signature 07: c Problem Signature 08: 26 Problem Signature 09: System.Exception OS Version: 6.1.7601.2.1.0.768.3 Locale ID: 2057 Attempts at changing the Network Lock firewall rule away from WPF to WF doesn't work, but Eddie stops crashing at least and instead tries to connect forever. Deactivating NL doesn't make the crashes stop and it's still not possible to connect to a server. Even setting the Network Lock back to "Automatic" still causes crashes; even when NL is not on. Changing the NL rule to "None" and not using NL, still means it's not possible to connect. Running Eddie as Administrator, under a Standard account, with NL off, NL firewall rules set to Automatic and the startup buttons unchecked, still means Eddie can't connect. Tried turning NL off, setting NL rules to automatic and turning off all startup options. Then I restarted and went back into the Standard account. Eddie can't connect to anything. Logs: After changing Eddie to WF: . 2016.07.24 18:20:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:20:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:20:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.139:443 . 2016.07.24 18:20:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:20:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.14 255.255.0.0' . 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:20:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:20:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:20:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:20:22 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:20:22 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:20:22 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:20:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.16.14/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:20:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.16.14/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:20:22 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:20:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.139 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:27 - Starting Management Interface . 2016.07.24 18:20:27 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:20:27 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:20:27 - Disconnecting . 2016.07.24 18:20:27 - Management - Send 'signal SIGTERM' . 2016.07.24 18:20:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:20:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:20:27 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.139 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:20:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:20:32 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:20:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:20:32 - Connection terminated. I 2016.07.24 18:20:32 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:20:35 - Checking authorization ... ! 2016.07.24 18:20:35 - Connecting to Atik (Netherlands, Alblasserdam) . 2016.07.24 18:20:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:20:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:20:35 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:20:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:20:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:20:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:20:35 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:20:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443 . 2016.07.24 18:20:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=4f13cc64 dd02edf7 . 2016.07.24 18:20:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:20:35 - OpenVPN > Validating certificate key usage . 2016.07.24 18:20:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:20:35 - OpenVPN > VERIFY KU OK . 2016.07.24 18:20:35 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:20:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:20:35 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:20:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:20:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:20:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:20:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:20:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443 . 2016.07.24 18:20:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:20:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.187 255.255.0.0' . 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:20:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:20:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:20:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:20:38 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:20:38 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:20:38 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:20:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.187/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:20:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.187/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:20:38 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:20:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:43 - Starting Management Interface . 2016.07.24 18:20:43 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:20:43 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:20:43 - Disconnecting . 2016.07.24 18:20:43 - Management - Send 'signal SIGTERM' . 2016.07.24 18:20:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:20:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:20:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.9 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:20:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:20:48 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:20:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:20:48 - Connection terminated. I 2016.07.24 18:20:48 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:20:51 - Checking authorization ... ! 2016.07.24 18:20:51 - Connecting to Alrami (Sweden, Uppsala) . 2016.07.24 18:20:51 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:20:51 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:20:51 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:20:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:20:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:20:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:51 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:20:51 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:20:51 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.145:443 . 2016.07.24 18:20:51 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=2e47e915 f1ac9748 . 2016.07.24 18:20:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:20:51 - OpenVPN > Validating certificate key usage . 2016.07.24 18:20:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:20:51 - OpenVPN > VERIFY KU OK . 2016.07.24 18:20:51 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:20:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:20:51 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:20:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:20:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:20:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:20:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:20:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:20:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443 . 2016.07.24 18:20:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:20:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.129 255.255.0.0' . 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:20:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:20:54 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:20:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:20:54 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:20:54 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:20:54 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:20:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.129/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:20:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.129/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:20:54 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:20:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:20:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:20:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:20:59 - Starting Management Interface . 2016.07.24 18:20:59 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:20:59 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:20:59 - Disconnecting . 2016.07.24 18:20:59 - Management - Send 'signal SIGTERM' . 2016.07.24 18:20:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:20:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:20:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.145 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:04 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:21:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:21:04 - Connection terminated. I 2016.07.24 18:21:04 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:21:07 - Checking authorization ... ! 2016.07.24 18:21:07 - Connecting to Kajam (Netherlands, Alblasserdam) . 2016.07.24 18:21:07 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:21:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:21:07 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:21:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:21:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:21:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:21:07 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:21:07 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.84:443 . 2016.07.24 18:21:07 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.84:443, sid=cb1bff94 a24286ff . 2016.07.24 18:21:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:21:07 - OpenVPN > Validating certificate key usage . 2016.07.24 18:21:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:21:07 - OpenVPN > VERIFY KU OK . 2016.07.24 18:21:07 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:21:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:21:07 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:21:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:21:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:21:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.84:443 . 2016.07.24 18:21:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:21:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.64 255.255.0.0' . 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:21:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:21:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:21:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:21:10 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:21:10 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:21:10 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:21:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.64/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:21:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.64/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:21:10 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:21:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.84 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:16 - Starting Management Interface . 2016.07.24 18:21:16 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:21:16 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:21:16 - Disconnecting . 2016.07.24 18:21:16 - Management - Send 'signal SIGTERM' . 2016.07.24 18:21:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:21:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:21:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.84 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:21 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:21:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:21:21 - Connection terminated. I 2016.07.24 18:21:21 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:21:24 - Checking authorization ... ! 2016.07.24 18:21:24 - Connecting to Altarf (Sweden, Uppsala) . 2016.07.24 18:21:24 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:21:24 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:21:24 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:21:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:21:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:21:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:24 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:21:24 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:21:24 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.140:443 . 2016.07.24 18:21:24 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=79154966 6c9f847f . 2016.07.24 18:21:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:21:25 - OpenVPN > Validating certificate key usage . 2016.07.24 18:21:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:21:25 - OpenVPN > VERIFY KU OK . 2016.07.24 18:21:25 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:21:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:21:25 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:21:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:21:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:21:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.140:443 . 2016.07.24 18:21:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:21:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.190 255.255.0.0' . 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:21:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:21:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:21:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:21:27 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:21:27 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:21:27 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:21:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.190/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:21:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:21:27 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:21:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.140 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:32 - Starting Management Interface . 2016.07.24 18:21:32 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:21:32 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:21:32 - Disconnecting . 2016.07.24 18:21:32 - Management - Send 'signal SIGTERM' . 2016.07.24 18:21:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:21:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:21:32 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.140 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:37 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:21:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:21:37 - Connection terminated. I 2016.07.24 18:21:37 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:21:40 - Checking authorization ... ! 2016.07.24 18:21:40 - Connecting to Hatysa (Sweden, Uppsala) . 2016.07.24 18:21:40 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:21:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:21:40 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:21:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:21:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:21:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:21:40 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:21:40 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443 . 2016.07.24 18:21:40 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=4e05c2ad e89c5041 . 2016.07.24 18:21:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:21:40 - OpenVPN > Validating certificate key usage . 2016.07.24 18:21:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:21:40 - OpenVPN > VERIFY KU OK . 2016.07.24 18:21:40 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:21:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:21:40 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:21:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:21:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:21:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.144:443 . 2016.07.24 18:21:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:21:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.118 255.255.0.0' . 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:21:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:21:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:21:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:21:43 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:21:43 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:21:43 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:21:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.118/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:21:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.118/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:21:43 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:21:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.144 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:21:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:21:48 - Starting Management Interface . 2016.07.24 18:21:48 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:21:48 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:21:48 - Disconnecting . 2016.07.24 18:21:48 - Management - Send 'signal SIGTERM' . 2016.07.24 18:21:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:21:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:21:48 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.144 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:21:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:21:53 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:21:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:21:53 - Connection terminated. I 2016.07.24 18:21:53 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:21:56 - Checking authorization ... ! 2016.07.24 18:21:56 - Connecting to Algieba (Sweden, Uppsala) . 2016.07.24 18:21:56 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:21:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:21:56 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:21:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:21:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:21:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:21:57 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:21:57 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.142:443 . 2016.07.24 18:21:57 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.142:443, sid=97ff7e9f c20505eb . 2016.07.24 18:21:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:21:57 - OpenVPN > Validating certificate key usage . 2016.07.24 18:21:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:21:57 - OpenVPN > VERIFY KU OK . 2016.07.24 18:21:57 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:21:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:21:57 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:21:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:21:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:21:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:21:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:21:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.142:443 . 2016.07.24 18:21:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:21:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.82 255.255.0.0' . 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:21:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:21:59 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:21:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:21:59 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:21:59 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:21:59 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:21:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.1.82/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:21:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.82/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:21:59 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:22:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.142 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:04 - Starting Management Interface . 2016.07.24 18:22:04 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:22:04 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:22:04 - Disconnecting . 2016.07.24 18:22:04 - Management - Send 'signal SIGTERM' . 2016.07.24 18:22:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:22:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:22:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.142 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:09 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:22:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:22:09 - Connection terminated. I 2016.07.24 18:22:09 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:22:12 - Checking authorization ... ! 2016.07.24 18:22:12 - Connecting to Phaet (Netherlands, Alblasserdam) . 2016.07.24 18:22:12 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:22:12 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:22:12 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:22:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:22:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:22:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:22:13 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:22:13 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.148:443 . 2016.07.24 18:22:13 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.148:443, sid=1f9d0ae9 2b4919de . 2016.07.24 18:22:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:22:13 - OpenVPN > Validating certificate key usage . 2016.07.24 18:22:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:22:13 - OpenVPN > VERIFY KU OK . 2016.07.24 18:22:13 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:22:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:22:13 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:22:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:22:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:22:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:22:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:22:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.148:443 . 2016.07.24 18:22:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:22:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.65.39 255.255.0.0' . 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:22:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:22:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:22:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:22:15 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:22:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:22:15 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:22:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.65.39/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:22:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.65.39/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:22:15 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:22:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.148 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:20 - Starting Management Interface . 2016.07.24 18:22:20 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:22:20 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:22:20 - Disconnecting . 2016.07.24 18:22:20 - Management - Send 'signal SIGTERM' . 2016.07.24 18:22:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:22:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:22:20 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.148 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:26 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:22:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:22:26 - Connection terminated. I 2016.07.24 18:22:26 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:22:29 - Checking authorization ... ! 2016.07.24 18:22:29 - Connecting to Menkab (Sweden, Uppsala) . 2016.07.24 18:22:29 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:22:29 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:22:29 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:22:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:22:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:22:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:29 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:22:29 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:22:29 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.143:443 . 2016.07.24 18:22:29 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=ec40e12d 9f3f95ce . 2016.07.24 18:22:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:22:29 - OpenVPN > Validating certificate key usage . 2016.07.24 18:22:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:22:29 - OpenVPN > VERIFY KU OK . 2016.07.24 18:22:29 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:22:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:22:29 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:22:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:22:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:22:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:22:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:22:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.143:443 . 2016.07.24 18:22:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:22:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.132 255.255.0.0' . 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:22:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:22:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:22:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:22:32 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:22:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:22:32 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:22:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.132/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:22:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:22:32 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:22:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.143 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:37 - Starting Management Interface . 2016.07.24 18:22:37 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:22:37 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:22:37 - Disconnecting . 2016.07.24 18:22:37 - Management - Send 'signal SIGTERM' . 2016.07.24 18:22:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:22:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:22:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.143 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:42 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:22:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:22:42 - Connection terminated. I 2016.07.24 18:22:42 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:22:45 - Checking authorization ... ! 2016.07.24 18:22:45 - Connecting to Alphecca (Netherlands, Alblasserdam) . 2016.07.24 18:22:45 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:22:45 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:22:45 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:22:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:22:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:22:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:45 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:22:45 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:22:45 - OpenVPN > UDPv4 link remote: [AF_INET]109.202.107.4:443 . 2016.07.24 18:22:45 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=5355732f 616cff46 . 2016.07.24 18:22:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:22:45 - OpenVPN > Validating certificate key usage . 2016.07.24 18:22:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:22:45 - OpenVPN > VERIFY KU OK . 2016.07.24 18:22:45 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:22:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:22:45 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:22:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:22:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:22:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:22:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:22:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:22:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443 . 2016.07.24 18:22:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:22:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.73 255.255.0.0' . 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:22:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:22:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:22:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:22:48 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:22:48 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:22:48 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:22:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.73/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:22:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.73/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:22:48 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:22:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.107.4 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:22:53 - Starting Management Interface . 2016.07.24 18:22:53 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:22:53 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:22:53 - Disconnecting . 2016.07.24 18:22:53 - Management - Send 'signal SIGTERM' . 2016.07.24 18:22:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:22:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:22:53 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.107.4 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:22:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:22:58 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:22:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:22:58 - Connection terminated. I 2016.07.24 18:22:58 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:23:01 - Checking authorization ... ! 2016.07.24 18:23:02 - Connecting to Gomeisa (Sweden, Uppsala) . 2016.07.24 18:23:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:23:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:23:02 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:23:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:23:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:23:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:23:02 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:23:02 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.132:443 . 2016.07.24 18:23:02 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=d51a70a7 a2362533 . 2016.07.24 18:23:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:23:02 - OpenVPN > Validating certificate key usage . 2016.07.24 18:23:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:23:02 - OpenVPN > VERIFY KU OK . 2016.07.24 18:23:02 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:23:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:23:02 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:23:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:23:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:23:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.132:443 . 2016.07.24 18:23:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:23:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.38.236 255.255.0.0' . 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:23:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:23:04 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:23:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:23:04 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:23:04 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:23:04 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:23:04 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.38.236/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:23:04 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.38.236/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:23:04 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:23:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.132 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:09 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:09 - Starting Management Interface . 2016.07.24 18:23:09 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:23:09 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:23:09 - Disconnecting . 2016.07.24 18:23:09 - Management - Send 'signal SIGTERM' . 2016.07.24 18:23:09 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:23:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:23:09 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.132 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:14 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:14 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:23:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:23:14 - Connection terminated. I 2016.07.24 18:23:14 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:23:17 - Checking authorization ... ! 2016.07.24 18:23:17 - Connecting to Ancha (Netherlands, Alblasserdam) . 2016.07.24 18:23:17 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:23:17 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:23:17 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:23:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:23:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:23:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:17 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:23:17 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:23:17 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.164:443 . 2016.07.24 18:23:17 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=fff50348 39acebca . 2016.07.24 18:23:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:23:17 - OpenVPN > Validating certificate key usage . 2016.07.24 18:23:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:23:17 - OpenVPN > VERIFY KU OK . 2016.07.24 18:23:17 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:23:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:23:17 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:23:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:23:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:23:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443 . 2016.07.24 18:23:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:23:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.141 255.255.0.0' . 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:23:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:23:20 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:23:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:23:20 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:23:20 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:23:20 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:23:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.42.141/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:23:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.42.141/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:23:20 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:23:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.164 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:25 - Starting Management Interface . 2016.07.24 18:23:25 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:23:25 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:23:25 - Disconnecting . 2016.07.24 18:23:25 - Management - Send 'signal SIGTERM' . 2016.07.24 18:23:25 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:23:25 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:23:25 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.164 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:30 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:30 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:23:30 - Connection terminated. . 2016.07.24 18:23:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting I 2016.07.24 18:23:30 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:23:33 - Checking authorization ... ! 2016.07.24 18:23:34 - Connecting to Atria (Sweden, Uppsala) . 2016.07.24 18:23:34 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:23:34 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:23:34 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:23:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:23:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:23:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:34 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:23:34 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:23:34 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443 . 2016.07.24 18:23:34 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=8df69e63 1ced5690 . 2016.07.24 18:23:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:23:34 - OpenVPN > Validating certificate key usage . 2016.07.24 18:23:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:23:34 - OpenVPN > VERIFY KU OK . 2016.07.24 18:23:34 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:23:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:23:34 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:23:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:23:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:23:34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443 . 2016.07.24 18:23:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:23:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.32 255.255.0.0' . 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:23:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:23:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:23:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:23:36 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:23:36 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:23:36 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:23:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.32/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:23:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.32/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:23:36 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:23:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:41 - Starting Management Interface . 2016.07.24 18:23:41 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:23:41 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:23:41 - Disconnecting . 2016.07.24 18:23:41 - Management - Send 'signal SIGTERM' . 2016.07.24 18:23:41 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:23:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:23:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:46 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:46 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:23:46 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:23:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:23:46 - Connection terminated. I 2016.07.24 18:23:46 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:23:49 - Checking authorization ... ! 2016.07.24 18:23:49 - Connecting to Aquilae (Germany, Frankfurt) . 2016.07.24 18:23:49 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:23:49 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:23:49 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:23:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:23:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:23:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:49 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:23:49 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:23:49 - OpenVPN > UDPv4 link remote: [AF_INET]46.165.208.70:443 . 2016.07.24 18:23:49 - OpenVPN > TLS: Initial packet from [AF_INET]46.165.208.70:443, sid=983eb5f2 9da0d903 . 2016.07.24 18:23:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:23:49 - OpenVPN > Validating certificate key usage . 2016.07.24 18:23:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:23:49 - OpenVPN > VERIFY KU OK . 2016.07.24 18:23:49 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:23:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:23:49 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:23:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:23:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:23:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:23:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:23:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]46.165.208.70:443 . 2016.07.24 18:23:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:23:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.123 255.255.0.0' . 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:23:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:23:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:23:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:23:52 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:23:52 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:23:52 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:23:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.21.123/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:23:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.21.123/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:23:52 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:23:57 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 46.165.208.70 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:23:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:23:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:23:57 - Starting Management Interface . 2016.07.24 18:23:57 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:23:57 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:23:57 - Disconnecting . 2016.07.24 18:23:57 - Management - Send 'signal SIGTERM' . 2016.07.24 18:23:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:23:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:23:57 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 46.165.208.70 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:24:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:24:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:24:02 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:24:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:24:02 - Connection terminated. I 2016.07.24 18:24:02 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:24:05 - Checking authorization ... ! 2016.07.24 18:24:05 - Connecting to Muphrid (Sweden, Uppsala) . 2016.07.24 18:24:05 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:24:05 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:24:05 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:24:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:24:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:24:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:24:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:24:05 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:24:05 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:24:05 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443 . 2016.07.24 18:24:05 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=31e78eb3 40e65ab5 . 2016.07.24 18:24:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:24:05 - OpenVPN > Validating certificate key usage . 2016.07.24 18:24:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:24:05 - OpenVPN > VERIFY KU OK . 2016.07.24 18:24:05 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:24:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:24:05 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:24:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:24:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:24:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:24:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:24:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:24:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:24:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443 After changing to WPF again: . 2016.07.24 18:25:28 - Management - Send 'signal SIGTERM' . 2016.07.24 18:25:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:25:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:25:28 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.147 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:25:33 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:25:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:25:33 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:25:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:25:33 - Connection terminated. I 2016.07.24 18:25:33 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:25:36 - Checking authorization ... ! 2016.07.24 18:25:36 - Connecting to Gianfar (Netherlands, Alblasserdam) . 2016.07.24 18:25:36 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:25:36 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:25:36 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:25:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:25:37 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:25:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:37 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:25:37 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:25:37 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.100:443 . 2016.07.24 18:25:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.100:443, sid=e0b428c3 299a05cd . 2016.07.24 18:25:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:25:37 - OpenVPN > Validating certificate key usage . 2016.07.24 18:25:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:25:37 - OpenVPN > VERIFY KU OK . 2016.07.24 18:25:37 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:25:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:25:37 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:25:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:25:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:25:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:25:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:25:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.100:443 . 2016.07.24 18:25:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:25:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.58.237 255.255.0.0' . 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:25:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:25:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:25:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:25:39 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:25:39 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:25:39 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:25:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.58.237/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:25:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.58.237/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:25:39 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:25:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.100 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:25:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:25:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:25:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:25:44 - Starting Management Interface . 2016.07.24 18:25:44 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:25:44 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:25:44 - Disconnecting . 2016.07.24 18:25:44 - Management - Send 'signal SIGTERM' . 2016.07.24 18:25:44 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:25:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:25:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.100 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:25:49 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:25:49 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:25:49 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:25:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:25:49 - Connection terminated. I 2016.07.24 18:25:49 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:25:52 - Checking authorization ... ! 2016.07.24 18:25:52 - Connecting to Situla (Netherlands, Alblasserdam) . 2016.07.24 18:25:52 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:25:52 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:25:52 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:25:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:25:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:25:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:52 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:25:52 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:25:52 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443 . 2016.07.24 18:25:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=d61f8a2a 8451263e . 2016.07.24 18:25:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:25:52 - OpenVPN > Validating certificate key usage . 2016.07.24 18:25:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:25:52 - OpenVPN > VERIFY KU OK . 2016.07.24 18:25:52 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:25:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:25:52 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:25:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:25:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:25:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:25:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:25:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:25:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443 . 2016.07.24 18:25:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:25:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.9 255.255.0.0' . 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:25:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:25:55 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:25:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:25:55 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:25:55 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:25:55 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:25:55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.9/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:25:55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.9/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:25:55 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:26:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.14 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:00 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:00 - Starting Management Interface . 2016.07.24 18:26:00 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:26:00 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:26:00 - Disconnecting . 2016.07.24 18:26:00 - Management - Send 'signal SIGTERM' . 2016.07.24 18:26:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:26:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:26:00 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.14 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:05 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:05 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:26:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:26:05 - Connection terminated. I 2016.07.24 18:26:05 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:26:08 - Checking authorization ... ! 2016.07.24 18:26:08 - Connecting to Subra (Netherlands, Alblasserdam) . 2016.07.24 18:26:08 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:26:08 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:26:08 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:26:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:26:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:26:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:08 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:26:08 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:26:08 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443 . 2016.07.24 18:26:08 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=3d7ee063 59907970 . 2016.07.24 18:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:26:09 - OpenVPN > Validating certificate key usage . 2016.07.24 18:26:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:26:09 - OpenVPN > VERIFY KU OK . 2016.07.24 18:26:09 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:26:09 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:26:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:26:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443 . 2016.07.24 18:26:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:26:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.62.132 255.255.0.0' . 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:26:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:26:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:26:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:26:11 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:26:11 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:26:11 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:26:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.62.132/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:26:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.62.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:26:11 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:26:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.98 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:16 - Starting Management Interface . 2016.07.24 18:26:16 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:26:16 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:26:16 - Disconnecting . 2016.07.24 18:26:16 - Management - Send 'signal SIGTERM' . 2016.07.24 18:26:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:26:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:26:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.98 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:21 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:21 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:26:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:26:21 - Connection terminated. I 2016.07.24 18:26:21 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:26:24 - Checking authorization ... ! 2016.07.24 18:26:25 - Connecting to Sheliak (Netherlands, Alblasserdam) . 2016.07.24 18:26:25 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:26:25 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:26:25 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:26:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:26:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:26:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:25 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:26:25 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:26:25 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443 . 2016.07.24 18:26:25 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=10efcf5e b4499cd4 . 2016.07.24 18:26:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:26:25 - OpenVPN > Validating certificate key usage . 2016.07.24 18:26:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:26:25 - OpenVPN > VERIFY KU OK . 2016.07.24 18:26:25 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:26:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:26:25 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:26:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:26:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:26:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443 . 2016.07.24 18:26:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:26:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.63.139 255.255.0.0' . 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:26:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:26:28 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:26:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:26:28 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:26:28 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:26:28 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:26:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.63.139/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:26:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.63.139/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:26:28 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:26:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:33 - Starting Management Interface . 2016.07.24 18:26:33 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:26:33 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:26:33 - Disconnecting . 2016.07.24 18:26:33 - Management - Send 'signal SIGTERM' . 2016.07.24 18:26:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:26:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:26:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:38 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:38 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:26:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:26:38 - Connection terminated. I 2016.07.24 18:26:38 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:26:41 - Checking authorization ... ! 2016.07.24 18:26:41 - Connecting to Alrai (Netherlands, Alblasserdam) . 2016.07.24 18:26:41 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:26:41 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:26:41 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:26:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:26:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:26:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:41 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:26:41 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:26:41 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.78:443 . 2016.07.24 18:26:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.78:443, sid=3aaf076d 8ac56fbb . 2016.07.24 18:26:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:26:41 - OpenVPN > Validating certificate key usage . 2016.07.24 18:26:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:26:41 - OpenVPN > VERIFY KU OK . 2016.07.24 18:26:41 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:26:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:26:41 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:26:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:26:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:26:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.78:443 . 2016.07.24 18:26:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:26:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.190 255.255.0.0' . 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:26:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:26:44 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:26:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:26:44 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:26:44 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:26:44 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:26:44 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.190/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:26:44 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:26:44 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:26:49 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.78 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:49 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:26:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:26:49 - Starting Management Interface . 2016.07.24 18:26:49 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:26:49 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:26:49 - Disconnecting . 2016.07.24 18:26:49 - Management - Send 'signal SIGTERM' . 2016.07.24 18:26:49 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:26:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:26:49 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.78 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:54 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:26:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:26:54 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:26:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:26:54 - Connection terminated. I 2016.07.24 18:26:54 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:26:57 - Checking authorization ... ! 2016.07.24 18:26:57 - Connecting to Marfic (France, Paris) . 2016.07.24 18:26:57 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:26:57 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:26:57 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:26:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:26:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:26:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:57 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:26:57 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:26:57 - OpenVPN > UDPv4 link remote: [AF_INET]195.154.194.18:443 . 2016.07.24 18:26:57 - OpenVPN > TLS: Initial packet from [AF_INET]195.154.194.18:443, sid=98f88da9 b9514889 . 2016.07.24 18:26:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:26:57 - OpenVPN > Validating certificate key usage . 2016.07.24 18:26:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:26:57 - OpenVPN > VERIFY KU OK . 2016.07.24 18:26:57 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:26:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:26:57 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:26:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:26:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:26:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:26:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:26:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]195.154.194.18:443 . 2016.07.24 18:27:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:27:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.216 255.255.0.0' . 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:27:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:27:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:27:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:27:00 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:27:00 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:27:00 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:27:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.216/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:27:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.216/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:27:00 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:27:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 195.154.194.18 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:05 - Starting Management Interface . 2016.07.24 18:27:05 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:27:05 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:27:05 - Disconnecting . 2016.07.24 18:27:05 - Management - Send 'signal SIGTERM' . 2016.07.24 18:27:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:27:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:27:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 195.154.194.18 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:10 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:10 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:10 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:27:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:27:10 - Connection terminated. I 2016.07.24 18:27:10 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:27:13 - Checking authorization ... ! 2016.07.24 18:27:13 - Connecting to Gienah (Netherlands, Alblasserdam) . 2016.07.24 18:27:13 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:27:13 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:27:13 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:27:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:27:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:27:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:27:13 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:27:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443 . 2016.07.24 18:27:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=63147a90 a8a9482b . 2016.07.24 18:27:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:27:13 - OpenVPN > Validating certificate key usage . 2016.07.24 18:27:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:27:13 - OpenVPN > VERIFY KU OK . 2016.07.24 18:27:13 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:27:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:27:13 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:27:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:27:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:27:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:27:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:27:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443 . 2016.07.24 18:27:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:27:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.23 255.255.0.0' . 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:27:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:27:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:27:16 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:27:16 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:27:16 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:27:16 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:27:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.23/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:27:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.23/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:27:16 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:27:21 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.93 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:21 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:21 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:21 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:21 - Starting Management Interface . 2016.07.24 18:27:21 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:27:21 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:27:21 - Disconnecting . 2016.07.24 18:27:21 - Management - Send 'signal SIGTERM' . 2016.07.24 18:27:21 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:27:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:27:21 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.93 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:26 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:27:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:27:26 - Connection terminated. I 2016.07.24 18:27:26 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:27:29 - Checking authorization ... ! 2016.07.24 18:27:30 - Connecting to Skat (Netherlands, Alblasserdam) . 2016.07.24 18:27:30 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:27:30 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:27:30 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:27:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:27:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:27:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:30 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:27:30 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:27:30 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.73:443 . 2016.07.24 18:27:30 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.73:443, sid=fee449c8 6edbc995 . 2016.07.24 18:27:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:27:30 - OpenVPN > Validating certificate key usage . 2016.07.24 18:27:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:27:30 - OpenVPN > VERIFY KU OK . 2016.07.24 18:27:30 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:27:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:27:30 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:27:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:27:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:27:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:27:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:27:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.73:443 . 2016.07.24 18:27:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:27:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.242 255.255.0.0' . 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:27:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:27:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:27:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:27:32 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:27:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:27:32 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:27:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.242/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:27:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.242/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:27:32 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:27:38 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.73 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:38 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:38 - Starting Management Interface . 2016.07.24 18:27:38 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:27:38 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:27:38 - Disconnecting . 2016.07.24 18:27:38 - Management - Send 'signal SIGTERM' . 2016.07.24 18:27:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:27:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:27:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.73 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:43 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:27:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:27:43 - Connection terminated. I 2016.07.24 18:27:43 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:27:46 - Checking authorization ... ! 2016.07.24 18:27:46 - Connecting to Minkar (United Kingdom, Maidenhead) . 2016.07.24 18:27:46 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:27:46 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:27:46 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:27:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:27:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:27:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:46 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:27:46 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:27:46 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.130:443 . 2016.07.24 18:27:46 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.130:443, sid=055d3daf d9c73205 . 2016.07.24 18:27:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:27:46 - OpenVPN > Validating certificate key usage . 2016.07.24 18:27:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:27:46 - OpenVPN > VERIFY KU OK . 2016.07.24 18:27:46 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:27:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:27:46 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:27:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:27:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:27:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:27:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:27:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:27:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.130:443 . 2016.07.24 18:27:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:27:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.215 255.255.0.0' . 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:27:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:27:49 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:27:49 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:27:49 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:27:49 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:27:49 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:27:49 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.13.215/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:27:49 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.215/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:27:49 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:27:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.130 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:54 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:27:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:27:54 - Starting Management Interface . 2016.07.24 18:27:54 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:27:54 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:27:54 - Disconnecting . 2016.07.24 18:27:54 - Management - Send 'signal SIGTERM' . 2016.07.24 18:27:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:27:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:27:54 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.130 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:59 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:27:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:27:59 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:27:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:27:59 - Connection terminated. I 2016.07.24 18:27:59 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:28:02 - Checking authorization ... ! 2016.07.24 18:28:02 - Connecting to Matar (Netherlands, Alblasserdam) . 2016.07.24 18:28:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:28:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:28:02 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:28:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:28:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:28:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:28:02 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:28:02 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.137:443 . 2016.07.24 18:28:02 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.137:443, sid=7fa108fa 4652ecb8 . 2016.07.24 18:28:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:28:02 - OpenVPN > Validating certificate key usage . 2016.07.24 18:28:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:28:02 - OpenVPN > VERIFY KU OK . 2016.07.24 18:28:02 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:28:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:28:02 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:28:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:28:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:28:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.137:443 . 2016.07.24 18:28:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:28:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.25 255.255.0.0' . 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:28:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:28:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:28:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:28:05 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:28:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:28:05 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:28:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.25/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:28:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.25/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:28:05 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:28:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 109.232.227.137 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:10 - Starting Management Interface . 2016.07.24 18:28:10 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:28:10 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:28:10 - Disconnecting . 2016.07.24 18:28:10 - Management - Send 'signal SIGTERM' . 2016.07.24 18:28:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:28:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:28:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.232.227.137 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:15 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:28:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:28:15 - Connection terminated. I 2016.07.24 18:28:15 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:28:18 - Checking authorization ... ! 2016.07.24 18:28:18 - Connecting to Hyadum (Netherlands, Alblasserdam) . 2016.07.24 18:28:18 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:28:18 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:28:18 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:28:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:28:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:28:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:18 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:28:18 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:28:18 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.34:443 . 2016.07.24 18:28:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.34:443, sid=c7d25aa4 ae64e4b3 . 2016.07.24 18:28:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:28:18 - OpenVPN > Validating certificate key usage . 2016.07.24 18:28:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:28:18 - OpenVPN > VERIFY KU OK . 2016.07.24 18:28:18 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:28:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:28:18 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:28:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:28:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:28:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.34:443 . 2016.07.24 18:28:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:28:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.61.99 255.255.0.0' . 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:28:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:28:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:28:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:28:21 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:28:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:28:21 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:28:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.61.99/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:28:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.61.99/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:28:21 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:28:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.34 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:26 - Starting Management Interface . 2016.07.24 18:28:26 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:28:26 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:28:26 - Disconnecting . 2016.07.24 18:28:26 - Management - Send 'signal SIGTERM' . 2016.07.24 18:28:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:28:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:28:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.34 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:31 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:28:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:28:31 - Connection terminated. I 2016.07.24 18:28:31 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:28:34 - Checking authorization ... ! 2016.07.24 18:28:35 - Connecting to Miram (Netherlands, Alblasserdam) . 2016.07.24 18:28:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:28:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:28:35 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:28:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:28:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:28:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:28:35 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:28:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.88:443 . 2016.07.24 18:28:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.88:443, sid=37de9d8a 237c9ec3 . 2016.07.24 18:28:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:28:35 - OpenVPN > Validating certificate key usage . 2016.07.24 18:28:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:28:35 - OpenVPN > VERIFY KU OK . 2016.07.24 18:28:35 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:28:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:28:35 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:28:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:28:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:28:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.88:443 . 2016.07.24 18:28:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:28:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.89 255.255.0.0' . 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:28:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:28:37 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:28:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:28:37 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:28:37 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:28:37 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:28:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.59.89/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:28:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.59.89/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:28:37 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:28:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.88 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:43 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:43 - Starting Management Interface . 2016.07.24 18:28:43 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:28:43 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:28:43 - Disconnecting . 2016.07.24 18:28:43 - Management - Send 'signal SIGTERM' . 2016.07.24 18:28:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:28:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:28:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.88 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:48 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:28:48 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:28:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:28:48 - Connection terminated. I 2016.07.24 18:28:48 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:28:51 - Checking authorization ... ! 2016.07.24 18:28:51 - Connecting to Albali (Sweden, Uppsala) . 2016.07.24 18:28:51 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:28:51 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:28:51 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:28:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:28:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:28:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:51 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:28:51 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:28:51 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.149:443 . 2016.07.24 18:28:51 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.149:443, sid=44b2e29b df70c45f . 2016.07.24 18:28:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:28:51 - OpenVPN > Validating certificate key usage . 2016.07.24 18:28:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:28:51 - OpenVPN > VERIFY KU OK . 2016.07.24 18:28:51 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:28:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:28:51 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:28:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:28:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:28:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:28:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:28:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.149:443 . 2016.07.24 18:28:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:28:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.225 255.255.0.0' . 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:28:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:28:54 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:28:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:28:54 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:28:54 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:28:54 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:28:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.225/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:28:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.225/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:28:54 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:28:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.149 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:28:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:28:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:28:59 - Starting Management Interface . 2016.07.24 18:28:59 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:28:59 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:28:59 - Disconnecting . 2016.07.24 18:28:59 - Management - Send 'signal SIGTERM' . 2016.07.24 18:28:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:28:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:28:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:28:59 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.149 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:29:04 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:29:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:29:04 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:29:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:29:04 - Connection terminated. I 2016.07.24 18:29:04 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:29:07 - Checking authorization ... ! 2016.07.24 18:29:07 - Connecting to Pherkad (Sweden, Uppsala) . 2016.07.24 18:29:07 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:29:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:29:07 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:29:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:29:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:29:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:29:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:29:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:29:07 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:29:07 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.134:443 . 2016.07.24 18:29:07 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.134:443, sid=35cc3a59 7c93f73e . 2016.07.24 18:29:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:29:07 - OpenVPN > Validating certificate key usage . 2016.07.24 18:29:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:29:07 - OpenVPN > VERIFY KU OK . 2016.07.24 18:29:07 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:29:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:29:07 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:29:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:29:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:29:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:29:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:29:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:29:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:29:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.134:443 . 2016.07.24 18:29:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:29:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.43.225 255.255.0.0' . 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:29:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:29:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=13 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:29:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:29:10 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:29:10 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:29:10 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:29:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.43.225/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:29:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.43.225/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:29:10 - OpenVPN > Successful ARP Flush on interface [17] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:29:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.134 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:29:15 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:29:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:29:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:29:15 - Starting Management Interface . 2016.07.24 18:29:15 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:29:15 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:29:15 - Disconnecting . 2016.07.24 18:29:15 - Management - Send 'signal SIGTERM' . 2016.07.24 18:29:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:29:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:29:15 - OpenVPN > SIGTERM received, sending exit notification to peer After resetting everything: I 2016.07.24 18:48:16 - Eddie client version: 2.11.2 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64 . 2016.07.24 18:48:16 - Reading options from C:\Users\U1\AppData\Local\AirVPN\AirVPN.xml . 2016.07.24 18:48:16 - Data Path: C:\Users\U1\AppData\Local\AirVPN . 2016.07.24 18:48:16 - App Path: C:\Program Files\AirVPN . 2016.07.24 18:48:16 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2016.07.24 18:48:16 - Command line arguments (1): path="home" . 2016.07.24 18:48:16 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1 I 2016.07.24 18:48:18 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 I 2016.07.24 18:48:18 - OpenVPN - Version: OpenVPN 2.3.11 (C:\Program Files\AirVPN\openvpn.exe) I 2016.07.24 18:48:18 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2016.07.24 18:48:18 - SSL - Version: stunnel 5.32 (C:\Program Files\AirVPN\stunnel.exe) W 2016.07.24 18:48:20 - Recovery. Unexpected crash? I 2016.07.24 18:48:20 - IPv6 restored with registry changes. ! 2016.07.24 18:48:20 - Ready . 2016.07.24 18:48:20 - Updating systems & servers data ... . 2016.07.24 18:48:21 - Systems & servers data update completed I 2016.07.24 18:48:23 - Session starting. I 2016.07.24 18:48:24 - IPv6 disabled with packet filtering. I 2016.07.24 18:48:24 - IPv6 disabled with registry changes. I 2016.07.24 18:48:24 - Checking authorization ... ! 2016.07.24 18:48:24 - Connecting to Hatysa (Sweden, Uppsala) . 2016.07.24 18:48:24 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:48:24 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:48:24 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:48:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:48:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:48:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:24 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:48:24 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:48:24 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443 . 2016.07.24 18:48:24 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=b029ec2e da35a15f . 2016.07.24 18:48:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:48:24 - OpenVPN > Validating certificate key usage . 2016.07.24 18:48:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:48:24 - OpenVPN > VERIFY KU OK . 2016.07.24 18:48:24 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:48:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:48:24 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:48:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:48:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:48:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:48:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:48:25 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.144:443 . 2016.07.24 18:48:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:48:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.7.118 255.255.0.0' . 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:48:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:48:27 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:48:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:48:27 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:48:27 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:48:27 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:48:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.7.118/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:48:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.7.118/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:48:27 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:48:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.144 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:48:32 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:48:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:48:32 - Starting Management Interface . 2016.07.24 18:48:32 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:48:32 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:48:32 - Disconnecting . 2016.07.24 18:48:32 - Management - Send 'signal SIGTERM' . 2016.07.24 18:48:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:48:32 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:48:32 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.144 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:48:37 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:48:37 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:48:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:48:37 - Connection terminated. I 2016.07.24 18:48:37 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:48:40 - Checking authorization ... ! 2016.07.24 18:48:40 - Connecting to Muphrid (Sweden, Uppsala) . 2016.07.24 18:48:40 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:48:40 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:48:40 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:48:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:48:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:48:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:40 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:48:40 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:48:40 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443 . 2016.07.24 18:48:40 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=5d0ea970 257b20fd . 2016.07.24 18:48:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:48:40 - OpenVPN > Validating certificate key usage . 2016.07.24 18:48:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:48:40 - OpenVPN > VERIFY KU OK . 2016.07.24 18:48:40 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:48:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:48:40 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:48:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:48:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:48:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:48:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:48:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443 . 2016.07.24 18:48:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:48:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.31 255.255.0.0' . 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:48:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:48:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:48:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:48:43 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:48:43 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:48:43 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:48:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.3.31/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:48:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.3.31/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:48:43 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:48:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.146 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:48:48 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:48:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:48:48 - Starting Management Interface . 2016.07.24 18:48:48 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:48:48 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:48:48 - Disconnecting . 2016.07.24 18:48:48 - Management - Send 'signal SIGTERM' . 2016.07.24 18:48:48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:48:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:48:48 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.146 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:48:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:48:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:48:53 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:48:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:48:53 - Connection terminated. I 2016.07.24 18:48:53 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:48:56 - Checking authorization ... ! 2016.07.24 18:48:56 - Connecting to Atria (Sweden, Uppsala) . 2016.07.24 18:48:56 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:48:56 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:48:56 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:48:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:48:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:48:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:56 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:48:56 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:48:56 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443 . 2016.07.24 18:48:56 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=0a23cbb1 88a9c2ef . 2016.07.24 18:48:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:48:56 - OpenVPN > Validating certificate key usage . 2016.07.24 18:48:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:48:56 - OpenVPN > VERIFY KU OK . 2016.07.24 18:48:56 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:48:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:48:56 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:48:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:48:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:48:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:48:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:48:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:48:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.150:443 . 2016.07.24 18:48:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:48:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.32 255.255.0.0' . 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:48:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:48:59 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:48:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:48:59 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:48:59 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:48:59 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:48:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.32/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:48:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.32/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:48:59 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:49:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.150 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:04 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:04 - Starting Management Interface . 2016.07.24 18:49:04 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:49:04 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:49:04 - Disconnecting . 2016.07.24 18:49:04 - Management - Send 'signal SIGTERM' . 2016.07.24 18:49:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:49:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:49:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.150 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:09 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:49:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:49:09 - Connection terminated. I 2016.07.24 18:49:09 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:49:12 - Checking authorization ... ! 2016.07.24 18:49:12 - Connecting to Serpentis (Sweden, Uppsala) . 2016.07.24 18:49:13 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:49:13 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:49:13 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:49:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:49:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:49:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:13 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:49:13 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:49:13 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.139:443 . 2016.07.24 18:49:13 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.139:443, sid=20ed0f0d 3bcef95f . 2016.07.24 18:49:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:49:13 - OpenVPN > Validating certificate key usage . 2016.07.24 18:49:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:49:13 - OpenVPN > VERIFY KU OK . 2016.07.24 18:49:13 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:49:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:49:13 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:49:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:49:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:49:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:49:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:49:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.139:443 . 2016.07.24 18:49:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:49:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.14 255.255.0.0' . 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:49:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:49:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:49:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:49:15 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:49:15 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:49:15 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:49:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.16.14/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:49:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.16.14/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:49:15 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:49:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.139 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:20 - Starting Management Interface . 2016.07.24 18:49:20 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:49:20 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:49:20 - Disconnecting . 2016.07.24 18:49:20 - Management - Send 'signal SIGTERM' . 2016.07.24 18:49:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:49:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:49:20 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.139 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:26 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:49:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:49:26 - Connection terminated. I 2016.07.24 18:49:26 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:49:29 - Checking authorization ... ! 2016.07.24 18:49:29 - Connecting to Alrami (Sweden, Uppsala) . 2016.07.24 18:49:29 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:49:29 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:49:29 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:49:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:49:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:49:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:29 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:49:29 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:49:29 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.145:443 . 2016.07.24 18:49:29 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.145:443, sid=a0de33bd 3bd114d3 . 2016.07.24 18:49:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:49:29 - OpenVPN > Validating certificate key usage . 2016.07.24 18:49:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:49:29 - OpenVPN > VERIFY KU OK . 2016.07.24 18:49:29 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:49:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:49:29 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:49:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:49:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:49:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:49:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:49:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.145:443 . 2016.07.24 18:49:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:49:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.129 255.255.0.0' . 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:49:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:49:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:49:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:49:32 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:49:32 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:49:32 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:49:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.129/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:49:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.129/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:49:32 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:49:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.145 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:37 - Starting Management Interface . 2016.07.24 18:49:37 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:49:37 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:49:37 - Disconnecting . 2016.07.24 18:49:37 - Management - Send 'signal SIGTERM' . 2016.07.24 18:49:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:49:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:49:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.145 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:42 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:42 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:49:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:49:42 - Connection terminated. I 2016.07.24 18:49:42 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:49:46 - Checking authorization ... ! 2016.07.24 18:49:46 - Connecting to Menkab (Sweden, Uppsala) . 2016.07.24 18:49:46 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:49:46 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:49:46 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:49:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:49:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:49:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:46 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:49:46 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:49:46 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.143:443 . 2016.07.24 18:49:46 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=431f463c 20327492 . 2016.07.24 18:49:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:49:46 - OpenVPN > Validating certificate key usage . 2016.07.24 18:49:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:49:46 - OpenVPN > VERIFY KU OK . 2016.07.24 18:49:46 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:49:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:49:46 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:49:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:49:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:49:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:49:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:49:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:49:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.143:443 . 2016.07.24 18:49:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:49:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.132 255.255.0.0' . 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:49:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:49:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:49:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:49:48 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:49:48 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:49:48 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:49:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.132/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:49:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.132/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:49:48 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:49:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.143 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:53 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:49:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:49:53 - Starting Management Interface . 2016.07.24 18:49:53 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:49:53 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:49:53 - Disconnecting . 2016.07.24 18:49:53 - Management - Send 'signal SIGTERM' . 2016.07.24 18:49:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:49:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:49:53 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.143 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:58 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:49:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:49:58 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:49:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:49:58 - Connection terminated. I 2016.07.24 18:49:58 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:50:01 - Checking authorization ... ! 2016.07.24 18:50:02 - Connecting to Talitha (Netherlands, Alblasserdam) . 2016.07.24 18:50:02 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:50:02 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:50:02 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:50:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:50:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:50:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:02 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:50:02 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:50:02 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.137:443 . 2016.07.24 18:50:02 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.137:443, sid=0a201ab1 82422541 . 2016.07.24 18:50:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:50:02 - OpenVPN > Validating certificate key usage . 2016.07.24 18:50:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:50:02 - OpenVPN > VERIFY KU OK . 2016.07.24 18:50:02 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:50:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:50:02 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:50:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:50:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:50:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.137:443 . 2016.07.24 18:50:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:50:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.60.202 255.255.0.0' . 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:50:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:50:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:50:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:50:05 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:50:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:50:05 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:50:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.60.202/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:50:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.60.202/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:50:05 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:50:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.137 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:10 - Starting Management Interface . 2016.07.24 18:50:10 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:50:10 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:50:10 - Disconnecting . 2016.07.24 18:50:10 - Management - Send 'signal SIGTERM' . 2016.07.24 18:50:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:50:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:50:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.137 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:15 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:15 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:50:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:50:15 - Connection terminated. I 2016.07.24 18:50:15 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:50:18 - Checking authorization ... ! 2016.07.24 18:50:18 - Connecting to Alula (Sweden, Uppsala) . 2016.07.24 18:50:18 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:50:18 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:50:18 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:50:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:50:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:50:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:18 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:50:18 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:50:18 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.151:443 . 2016.07.24 18:50:18 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.151:443, sid=e0da2a96 5a9581a6 . 2016.07.24 18:50:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:50:18 - OpenVPN > Validating certificate key usage . 2016.07.24 18:50:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:50:18 - OpenVPN > VERIFY KU OK . 2016.07.24 18:50:18 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:50:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:50:18 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:50:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:50:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:50:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.151:443 . 2016.07.24 18:50:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:50:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.105 255.255.0.0' . 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:50:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:50:21 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:50:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:50:21 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:50:21 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:50:21 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:50:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.14.105/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:50:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.14.105/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:50:21 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:50:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.151 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:26 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:26 - Starting Management Interface . 2016.07.24 18:50:26 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:50:26 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:50:26 - Disconnecting . 2016.07.24 18:50:26 - Management - Send 'signal SIGTERM' . 2016.07.24 18:50:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:50:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:50:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.151 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:31 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:31 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:50:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:50:31 - Connection terminated. I 2016.07.24 18:50:31 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:50:34 - Checking authorization ... ! 2016.07.24 18:50:35 - Connecting to Altarf (Sweden, Uppsala) . 2016.07.24 18:50:35 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:50:35 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:50:35 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:50:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:50:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:50:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:35 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:50:35 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:50:35 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.140:443 . 2016.07.24 18:50:35 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=875daa1e f2b5dd04 . 2016.07.24 18:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:50:35 - OpenVPN > Validating certificate key usage . 2016.07.24 18:50:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:50:35 - OpenVPN > VERIFY KU OK . 2016.07.24 18:50:35 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:50:35 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:50:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.140:443 . 2016.07.24 18:50:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:50:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.190 255.255.0.0' . 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:50:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:50:37 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:50:37 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:50:37 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:50:37 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:50:37 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:50:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.190/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:50:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.190/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:50:37 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} . 2016.07.24 18:50:42 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.140 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:42 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:42 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2016.07.24 18:50:42 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.07.24 18:50:42 - Starting Management Interface . 2016.07.24 18:50:42 - OpenVPN > Initialization Sequence Completed W 2016.07.24 18:50:42 - Windows WFP, Add rule failed: Unknown interface ID '{FE46CB1F-8746-4797-B385-9A4D624B89C6}' ! 2016.07.24 18:50:42 - Disconnecting . 2016.07.24 18:50:42 - Management - Send 'signal SIGTERM' . 2016.07.24 18:50:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.07.24 18:50:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.07.24 18:50:42 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 62.102.148.140 MASK 255.255.255.255 192.168.1.1 . 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1 . 2016.07.24 18:50:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2016.07.24 18:50:47 - OpenVPN > Closing TUN/TAP interface . 2016.07.24 18:50:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2016.07.24 18:50:47 - Connection terminated. I 2016.07.24 18:50:47 - DNS leak protection with packet filtering disabled. I 2016.07.24 18:50:50 - Checking authorization ... ! 2016.07.24 18:50:50 - Connecting to Hassaleh (Netherlands, Alblasserdam) . 2016.07.24 18:50:50 - OpenVPN > OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jun 1 2016 . 2016.07.24 18:50:50 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2016.07.24 18:50:50 - OpenVPN > library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09 . 2016.07.24 18:50:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.07.24 18:50:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.07.24 18:50:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:50 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2016.07.24 18:50:50 - OpenVPN > UDPv4 link local: [undef] . 2016.07.24 18:50:50 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.39:443 . 2016.07.24 18:50:50 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.39:443, sid=587dfb98 d170be2d . 2016.07.24 18:50:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.07.24 18:50:50 - OpenVPN > Validating certificate key usage . 2016.07.24 18:50:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.07.24 18:50:50 - OpenVPN > VERIFY KU OK . 2016.07.24 18:50:50 - OpenVPN > Validating certificate extended key usage . 2016.07.24 18:50:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.07.24 18:50:50 - OpenVPN > VERIFY EKU OK . 2016.07.24 18:50:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.07.24 18:50:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.07.24 18:50:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.07.24 18:50:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.07.24 18:50:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.39:443 . 2016.07.24 18:50:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.07.24 18:50:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.138 255.255.0.0' . 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.07.24 18:50:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.07.24 18:50:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=2c:41:38:8c:7c:8b . 2016.07.24 18:50:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.07.24 18:50:53 - OpenVPN > open_tun, tt->ipv6=0 . 2016.07.24 18:50:53 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{FE46CB1F-8746-4797-B385-9A4D624B89C6}.tap . 2016.07.24 18:50:53 - OpenVPN > TAP-Windows Driver Version 9.21 . 2016.07.24 18:50:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.64.138/255.255.0.0 [sUCCEEDED] . 2016.07.24 18:50:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.64.138/255.255.0.0 on interface {FE46CB1F-8746-4797-B385-9A4D624B89C6} [DHCP-serv: 10.4.255.254, lease-time: 31536000] . 2016.07.24 18:50:53 - OpenVPN > Successful ARP Flush on interface [14] {FE46CB1F-8746-4797-B385-9A4D624B89C6} Feel free to tell me if there's more information I can provide #datalove EDIT: Doesn't work on Admin account either now. EDIT 2: There's a popup when it crashes, which reads: AirVPN Unexpected error. Please contact our support staff. - Unexpected: NetLock WFP rule doesn't exists - at Eddie.Platforms.NetworkLockWfp.RemoveRule(String code) at Eddie.Core.InterfaceScope.End() at Eddie.Core.InterfaceScope.Finalize() I hope this helps
  23. It really depends on your specific situation :]. Some ISPs block certain ports and protocols while others don't. It doesn't hurt to experiment though. If it was all the same, it wouldn't be included in the client haha. It's to give you options. If you're in a place like China for instance, then SSL Tunnel on port 443 is pretty much required, for instance.
×
×
  • Create New...