Jump to content
Not connected, Your IP: 18.117.158.124

ForgottenSkynet

Members2
  • Content Count

    10
  • Joined

    ...
  • Last visited

    ...

Everything posted by ForgottenSkynet

  1. It's a fairly new modem, only a couple years old maybe. Other computers in the house easily get 50mbps from it with no issues. I might have a better alternative for further information, after experimenting for a few days. I run parallels, which is a virtual machine. For whatever reason, airlock does not work with it (so all internet connections made through windows are from my actual IP address). Might be to do with the OS directly accessing the hardware, not a problem. Anyway, I was in the middle of an online game on the windows side, when to my dismay, I heard the VPN disconnect. But everyone was still moving around, and I didn't disconnect. I also noticed that my mac was connected to wifi. If that's not evidence enough, what about this: When the connection becomes silent for over 10 seconds or so, the vpn will give up and disconnect from the server. However once it chooses a new server to connect to, it's instantly ok again. I'm pretty sure this can confirm that it's not to do with the wifi or the connection to my computer.
  2. Alright well thanks for the responses. I will monitor the upload/download without the VPN.
  3. This is over wifi, it says "OS X" in the logs. It's in the log! Mac OS X El Capitan Can you not see the log in my original post? I added it with an edit like 2 minutes after posting it. Log . 2017.04.03 14:34:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.03 14:34:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.03 14:34:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.03 14:34:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:09 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.03 14:34:09 - OpenVPN > UDPv4 link local: [undef] . 2017.04.03 14:34:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443 . 2017.04.03 14:34:12 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=7d38e23d 4c09a0c0 . 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 14:34:12 - OpenVPN > Validating certificate key usage . 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 14:34:12 - OpenVPN > VERIFY KU OK . 2017.04.03 14:34:12 - OpenVPN > Validating certificate extended key usage . 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 14:34:12 - OpenVPN > VERIFY EKU OK . 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 14:34:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443 . 2017.04.03 14:34:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.03 14:34:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0' . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.03 14:34:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.03 14:34:17 - OpenVPN > Opened utun device utun0 . 2017.04.03 14:34:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.03 14:34:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0 . 2017.04.03 14:34:17 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23 . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255 . 2017.04.03 14:34:17 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1 . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.03 14:34:17 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.03 14:34:17 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.03 14:34:17 - Starting Management Interface . 2017.04.03 14:34:17 - OpenVPN > Initialization Sequence Completed I 2017.04.03 14:34:17 - DNS of a network adapter forced (Ethernet) I 2017.04.03 14:34:17 - DNS of a network adapter forced (Wi-Fi) I 2017.04.03 14:34:17 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.03 14:34:17 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.03 14:34:17 - Flushing DNS . 2017.04.03 14:34:18 - OS X - PF rules updated, reloading I 2017.04.03 14:34:18 - Checking route I 2017.04.03 14:34:19 - Checking DNS ! 2017.04.03 14:34:19 - Connected. . 2017.04.03 14:34:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.03 14:34:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.03 14:36:43 - Updating systems & servers data ... . 2017.04.03 14:36:44 - Systems & servers data update completed . 2017.04.03 15:07:38 - Updating systems & servers data ... . 2017.04.03 15:07:39 - Systems & servers data update completed . 2017.04.03 15:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=114372764/0 pkts=286783/0 . 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 15:34:15 - OpenVPN > Validating certificate key usage . 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 15:34:15 - OpenVPN > VERIFY KU OK . 2017.04.03 15:34:15 - OpenVPN > Validating certificate extended key usage . 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 15:34:15 - OpenVPN > VERIFY EKU OK . 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 15:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 15:37:52 - Updating systems & servers data ... . 2017.04.03 15:37:52 - Systems & servers data update completed . 2017.04.03 16:08:06 - Updating systems & servers data ... . 2017.04.03 16:08:25 - Systems & servers data update completed . 2017.04.03 16:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=55751057/0 pkts=312959/0 . 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 16:34:15 - OpenVPN > Validating certificate key usage . 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 16:34:15 - OpenVPN > VERIFY KU OK . 2017.04.03 16:34:15 - OpenVPN > Validating certificate extended key usage . 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 16:34:15 - OpenVPN > VERIFY EKU OK . 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 16:34:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 16:38:16 - Updating systems & servers data ... . 2017.04.03 16:38:16 - Systems & servers data update completed . 2017.04.03 17:09:12 - Updating systems & servers data ... . 2017.04.03 17:09:12 - OS X - PF rules updated, reloading . 2017.04.03 17:09:13 - Systems & servers data update completed I 2017.04.03 17:34:15 - Renewing TLS key . 2017.04.03 17:34:15 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 17:34:17 - OpenVPN > TLS: soft reset sec=0 bytes=15102625/0 pkts=42253/0 . 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 17:34:17 - OpenVPN > Validating certificate key usage . 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 17:34:17 - OpenVPN > VERIFY KU OK . 2017.04.03 17:34:17 - OpenVPN > Validating certificate extended key usage . 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 17:34:17 - OpenVPN > VERIFY EKU OK . 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 17:34:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 17:40:08 - Updating systems & servers data ... . 2017.04.03 17:40:09 - Systems & servers data update completed . 2017.04.03 18:11:04 - Updating systems & servers data ... . 2017.04.03 18:11:06 - Systems & servers data update completed I 2017.04.03 18:34:17 - Renewing TLS key . 2017.04.03 18:34:17 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 18:34:19 - OpenVPN > TLS: soft reset sec=0 bytes=13987374/0 pkts=40248/0 . 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 18:34:19 - OpenVPN > Validating certificate key usage . 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 18:34:19 - OpenVPN > VERIFY KU OK . 2017.04.03 18:34:19 - OpenVPN > Validating certificate extended key usage . 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 18:34:19 - OpenVPN > VERIFY EKU OK . 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 18:34:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 18:42:02 - Updating systems & servers data ... . 2017.04.03 18:42:02 - Systems & servers data update completed . 2017.04.03 19:13:01 - Updating systems & servers data ... . 2017.04.03 19:13:03 - Systems & servers data update completed I 2017.04.03 19:34:19 - Renewing TLS key . 2017.04.03 19:34:19 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 19:34:27 - OpenVPN > TLS: soft reset sec=0 bytes=43321137/0 pkts=83190/0 . 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 19:34:27 - OpenVPN > Validating certificate key usage . 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 19:34:27 - OpenVPN > VERIFY KU OK . 2017.04.03 19:34:27 - OpenVPN > Validating certificate extended key usage . 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 19:34:27 - OpenVPN > VERIFY EKU OK . 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 19:34:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 19:43:09 - Updating systems & servers data ... . 2017.04.03 19:43:10 - Systems & servers data update completed . 2017.04.03 20:14:08 - Updating systems & servers data ... . 2017.04.03 20:14:08 - Systems & servers data update completed I 2017.04.03 20:34:27 - Renewing TLS key . 2017.04.03 20:34:27 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 20:34:35 - OpenVPN > TLS: soft reset sec=0 bytes=406592114/0 pkts=529431/0 . 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 20:34:35 - OpenVPN > Validating certificate key usage . 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 20:34:35 - OpenVPN > VERIFY KU OK . 2017.04.03 20:34:35 - OpenVPN > Validating certificate extended key usage . 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 20:34:35 - OpenVPN > VERIFY EKU OK . 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 20:34:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 20:45:04 - Updating systems & servers data ... . 2017.04.03 20:45:06 - Systems & servers data update completed . 2017.04.03 21:15:56 - Updating systems & servers data ... . 2017.04.03 21:15:57 - Systems & servers data update completed I 2017.04.03 21:34:35 - Renewing TLS key . 2017.04.03 21:34:35 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 21:34:36 - OpenVPN > TLS: soft reset sec=0 bytes=74188922/0 pkts=107635/0 . 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 21:34:36 - OpenVPN > Validating certificate key usage . 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 21:34:36 - OpenVPN > VERIFY KU OK . 2017.04.03 21:34:36 - OpenVPN > Validating certificate extended key usage . 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 21:34:36 - OpenVPN > VERIFY EKU OK . 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 21:34:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 21:46:47 - Updating systems & servers data ... . 2017.04.03 21:46:48 - Systems & servers data update completed . 2017.04.03 22:17:41 - Updating systems & servers data ... . 2017.04.03 22:17:43 - Systems & servers data update completed I 2017.04.03 22:34:36 - Renewing TLS key . 2017.04.03 22:34:36 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 22:34:44 - OpenVPN > TLS: soft reset sec=0 bytes=155541345/0 pkts=191560/0 . 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 22:34:44 - OpenVPN > Validating certificate key usage . 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 22:34:44 - OpenVPN > VERIFY KU OK . 2017.04.03 22:34:44 - OpenVPN > Validating certificate extended key usage . 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 22:34:44 - OpenVPN > VERIFY EKU OK . 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 22:34:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 22:48:38 - Updating systems & servers data ... . 2017.04.03 22:48:39 - Systems & servers data update completed . 2017.04.03 23:19:34 - Updating systems & servers data ... . 2017.04.03 23:19:36 - Systems & servers data update completed I 2017.04.03 23:34:44 - Renewing TLS key . 2017.04.03 23:34:44 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 23:34:50 - OpenVPN > TLS: soft reset sec=0 bytes=543820781/0 pkts=624008/0 . 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 23:34:50 - OpenVPN > Validating certificate key usage . 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 23:34:50 - OpenVPN > VERIFY KU OK . 2017.04.03 23:34:50 - OpenVPN > Validating certificate extended key usage . 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 23:34:50 - OpenVPN > VERIFY EKU OK . 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 23:34:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 23:50:31 - Updating systems & servers data ... . 2017.04.03 23:50:32 - Systems & servers data update completed . 2017.04.04 00:21:28 - Updating systems & servers data ... . 2017.04.04 00:21:36 - Systems & servers data update completed I 2017.04.04 00:34:50 - Renewing TLS key . 2017.04.04 00:34:50 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 00:34:51 - OpenVPN > TLS: soft reset sec=0 bytes=298572455/0 pkts=329031/0 . 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 00:34:51 - OpenVPN > Validating certificate key usage . 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 00:34:51 - OpenVPN > VERIFY KU OK . 2017.04.04 00:34:51 - OpenVPN > Validating certificate extended key usage . 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 00:34:51 - OpenVPN > VERIFY EKU OK . 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 00:34:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 00:51:34 - Updating systems & servers data ... . 2017.04.04 00:51:35 - Systems & servers data update completed . 2017.04.04 01:22:29 - Updating systems & servers data ... . 2017.04.04 01:22:31 - Systems & servers data update completed I 2017.04.04 01:34:51 - Renewing TLS key . 2017.04.04 01:34:51 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 01:34:54 - OpenVPN > TLS: soft reset sec=0 bytes=304191023/0 pkts=343770/0 . 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 01:34:54 - OpenVPN > Validating certificate key usage . 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 01:34:54 - OpenVPN > VERIFY KU OK . 2017.04.04 01:34:54 - OpenVPN > Validating certificate extended key usage . 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 01:34:54 - OpenVPN > VERIFY EKU OK . 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 01:35:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 01:53:27 - Updating systems & servers data ... . 2017.04.04 01:53:28 - Systems & servers data update completed . 2017.04.04 02:23:35 - Updating systems & servers data ... . 2017.04.04 02:23:37 - Systems & servers data update completed I 2017.04.04 02:34:54 - Renewing TLS key . 2017.04.04 02:34:54 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 02:35:00 - OpenVPN > Validating certificate key usage . 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 02:35:00 - OpenVPN > VERIFY KU OK . 2017.04.04 02:35:00 - OpenVPN > Validating certificate extended key usage . 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 02:35:00 - OpenVPN > VERIFY EKU OK . 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 02:35:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 02:46:45 - OS X - PF rules updated, reloading ! 2017.04.04 02:46:45 - Disconnecting . 2017.04.04 02:46:45 - Management - Send 'signal SIGTERM' . 2017.04.04 02:46:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 02:46:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 213.152.162.98 192.168.0.1 255.255.255.255 . 2017.04.04 02:46:50 - OpenVPN > delete net 213.152.162.98: gateway 192.168.0.1 . 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 02:46:50 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 02:46:50 - Connection terminated. I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Ethernet) . 2017.04.04 02:46:50 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 02:46:50 - OpenVPN > Closing TUN/TAP interface . 2017.04.04 02:46:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Ethernet) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Wi-Fi) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Bluetooth PAN) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Thunderbolt Bridge) ! 2017.04.04 02:46:50 - Session terminated. . 2017.04.04 02:53:41 - Updating systems & servers data ... . 2017.04.04 02:53:41 - Systems & servers data update completed . 2017.04.04 03:24:35 - Updating systems & servers data ... . 2017.04.04 03:24:36 - Systems & servers data update completed . 2017.04.04 03:55:30 - Updating systems & servers data ... . 2017.04.04 03:55:30 - Systems & servers data update completed . 2017.04.04 04:26:24 - Updating systems & servers data ... . 2017.04.04 04:26:25 - Systems & servers data update completed . 2017.04.04 04:57:19 - Updating systems & servers data ... . 2017.04.04 04:57:20 - Systems & servers data update completed . 2017.04.04 05:28:14 - Updating systems & servers data ... . 2017.04.04 05:28:14 - Systems & servers data update completed . 2017.04.04 05:59:09 - Updating systems & servers data ... . 2017.04.04 05:59:09 - Systems & servers data update completed . 2017.04.04 06:30:03 - Updating systems & servers data ... . 2017.04.04 06:30:04 - Systems & servers data update completed . 2017.04.04 07:00:58 - Updating systems & servers data ... . 2017.04.04 07:00:59 - Systems & servers data update completed . 2017.04.04 07:31:53 - Updating systems & servers data ... . 2017.04.04 07:31:53 - Systems & servers data update completed . 2017.04.04 08:02:48 - Updating systems & servers data ... . 2017.04.04 08:02:48 - Systems & servers data update completed . 2017.04.04 08:33:42 - Updating systems & servers data ... . 2017.04.04 08:33:42 - Systems & servers data update completed . 2017.04.04 09:04:36 - Updating systems & servers data ... . 2017.04.04 09:04:37 - Systems & servers data update completed . 2017.04.04 09:35:31 - Updating systems & servers data ... . 2017.04.04 09:35:32 - Systems & servers data update completed . 2017.04.04 10:06:26 - Updating systems & servers data ... . 2017.04.04 10:06:26 - Systems & servers data update completed . 2017.04.04 10:37:21 - Updating systems & servers data ... . 2017.04.04 10:37:21 - Systems & servers data update completed . 2017.04.04 11:08:16 - Updating systems & servers data ... . 2017.04.04 11:08:16 - Systems & servers data update completed . 2017.04.04 11:39:11 - Updating systems & servers data ... . 2017.04.04 11:39:11 - Systems & servers data update completed . 2017.04.04 12:10:05 - Updating systems & servers data ... . 2017.04.04 12:10:06 - Systems & servers data update completed . 2017.04.04 12:41:00 - Updating systems & servers data ... . 2017.04.04 12:41:01 - Systems & servers data update completed I 2017.04.04 12:43:48 - Session starting. I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Ethernet) I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Wi-Fi) I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Bluetooth PAN) I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Thunderbolt Bridge) I 2017.04.04 12:43:48 - Checking authorization ... ! 2017.04.04 12:43:49 - Connecting to Gienah (Netherlands, Alblasserdam) . 2017.04.04 12:43:49 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 12:43:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 12:43:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 12:43:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 12:43:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:49 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 12:43:49 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 12:43:49 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443 . 2017.04.04 12:43:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=0359c113 770eb6f0 . 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 12:43:49 - OpenVPN > Validating certificate key usage . 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 12:43:49 - OpenVPN > VERIFY KU OK . 2017.04.04 12:43:49 - OpenVPN > Validating certificate extended key usage . 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 12:43:49 - OpenVPN > VERIFY EKU OK . 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 12:43:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443 . 2017.04.04 12:43:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 12:43:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.97 255.255.0.0' . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 12:43:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 12:43:53 - OpenVPN > route: writing to routing socket: File exists . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 12:43:53 - OpenVPN > Opened utun device utun0 . 2017.04.04 12:43:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 12:43:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 10.4.70.97 10.4.70.97 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.70.97 255.255.0.0 . 2017.04.04 12:43:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.70.97 . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 213.152.162.93 192.168.0.1 255.255.255.255 . 2017.04.04 12:43:53 - OpenVPN > add net 213.152.162.93: gateway 192.168.0.1: File exists . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 12:43:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 12:43:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 12:43:53 - Starting Management Interface . 2017.04.04 12:43:53 - OpenVPN > Initialization Sequence Completed I 2017.04.04 12:43:53 - DNS of a network adapter forced (Ethernet) I 2017.04.04 12:43:53 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 12:43:53 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 12:43:53 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 12:43:53 - Flushing DNS . 2017.04.04 12:43:53 - OS X - PF rules updated, reloading I 2017.04.04 12:43:53 - Checking route I 2017.04.04 12:43:54 - Checking DNS ! 2017.04.04 12:43:54 - Connected. . 2017.04.04 12:43:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 12:43:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 13:11:57 - Updating systems & servers data ... . 2017.04.04 13:12:00 - Systems & servers data update completed . 2017.04.04 13:42:58 - Updating systems & servers data ... . 2017.04.04 13:42:59 - Systems & servers data update completed . 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 13:43:50 - OpenVPN > Validating certificate key usage . 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 13:43:50 - OpenVPN > VERIFY KU OK . 2017.04.04 13:43:50 - OpenVPN > Validating certificate extended key usage . 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 13:43:50 - OpenVPN > VERIFY EKU OK . 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 13:43:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 14:12:59 - Updating systems & servers data ... . 2017.04.04 14:12:59 - Systems & servers data update completed . 2017.04.04 14:43:01 - Updating systems & servers data ... . 2017.04.04 14:43:02 - Systems & servers data update completed I 2017.04.04 14:43:50 - Renewing TLS key . 2017.04.04 14:43:50 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 14:43:53 - OpenVPN > TLS: soft reset sec=0 bytes=13993207/0 pkts=33370/0 . 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 14:43:54 - OpenVPN > Validating certificate key usage . 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 14:43:54 - OpenVPN > VERIFY KU OK . 2017.04.04 14:43:54 - OpenVPN > Validating certificate extended key usage . 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 14:43:54 - OpenVPN > VERIFY EKU OK . 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 14:43:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 15:14:03 - Updating systems & servers data ... . 2017.04.04 15:14:03 - Systems & servers data update completed . 2017.04.04 15:31:13 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.04 15:31:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 15:31:13 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 15:31:13 - OS X - PF rules updated, reloading ! 2017.04.04 15:31:13 - Disconnecting . 2017.04.04 15:31:13 - Management - Send 'signal SIGTERM' . 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 15:31:13 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 15:31:13 - OpenVPN > Exiting due to fatal error . 2017.04.04 15:31:14 - Connection terminated. I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 15:31:26 - Checking authorization ... ! 2017.04.04 15:31:26 - Connecting to Subra (Netherlands, Alblasserdam) . 2017.04.04 15:31:26 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 15:31:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 15:31:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 15:31:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 15:31:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:26 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 15:31:26 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 15:31:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443 . 2017.04.04 15:31:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=82cabec5 26b9b800 . 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 15:31:30 - OpenVPN > Validating certificate key usage . 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 15:31:30 - OpenVPN > VERIFY KU OK . 2017.04.04 15:31:30 - OpenVPN > Validating certificate extended key usage . 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 15:31:30 - OpenVPN > VERIFY EKU OK . 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 15:31:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443 . 2017.04.04 15:31:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 15:31:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0' . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 15:31:36 - OpenVPN > Opened utun device utun0 . 2017.04.04 15:31:36 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 15:31:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 15:31:36 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0 . 2017.04.04 15:31:36 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23 . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255 . 2017.04.04 15:31:36 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1 . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 15:31:36 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 15:31:36 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 15:31:36 - Starting Management Interface . 2017.04.04 15:31:36 - OpenVPN > Initialization Sequence Completed I 2017.04.04 15:31:36 - DNS of a network adapter forced (Ethernet) I 2017.04.04 15:31:36 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 15:31:36 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 15:31:36 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 15:31:36 - Flushing DNS . 2017.04.04 15:31:36 - OS X - PF rules updated, reloading I 2017.04.04 15:31:36 - Checking route I 2017.04.04 15:31:37 - Checking DNS ! 2017.04.04 15:31:37 - Connected. . 2017.04.04 15:31:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 15:31:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 15:44:59 - Updating systems & servers data ... . 2017.04.04 15:45:00 - Systems & servers data update completed . 2017.04.04 16:15:55 - Updating systems & servers data ... . 2017.04.04 16:15:57 - Systems & servers data update completed . 2017.04.04 16:31:33 - OpenVPN > TLS: soft reset sec=0 bytes=5887067/0 pkts=22098/0 . 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 16:31:33 - OpenVPN > Validating certificate key usage . 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 16:31:33 - OpenVPN > VERIFY KU OK . 2017.04.04 16:31:33 - OpenVPN > Validating certificate extended key usage . 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 16:31:33 - OpenVPN > VERIFY EKU OK . 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS handshake failed . 2017.04.04 16:32:33 - OpenVPN > TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1 . 2017.04.04 16:32:34 - OpenVPN > [uNDEF] Inactivity timeout (--ping-restart), restarting . 2017.04.04 16:32:34 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 16:32:34 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 16:32:34 - OS X - PF rules updated, reloading ! 2017.04.04 16:32:34 - Disconnecting . 2017.04.04 16:32:34 - Management - Send 'signal SIGTERM' . 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 16:32:34 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 16:32:34 - OpenVPN > Exiting due to fatal error . 2017.04.04 16:32:34 - Connection terminated. I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 16:32:48 - Checking authorization ... ! 2017.04.04 16:32:48 - Connecting to Ancha (Netherlands, Alblasserdam) . 2017.04.04 16:32:48 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 16:32:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 16:32:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 16:32:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 16:32:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:48 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 16:32:48 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 16:32:48 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.164:443 . 2017.04.04 16:32:48 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=a3668ad5 f28645b8 . 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 16:32:48 - OpenVPN > Validating certificate key usage . 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 16:32:48 - OpenVPN > VERIFY KU OK . 2017.04.04 16:32:48 - OpenVPN > Validating certificate extended key usage . 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 16:32:48 - OpenVPN > VERIFY EKU OK . 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 16:32:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443 . 2017.04.04 16:33:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 16:33:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.53.187 255.255.0.0' . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 16:33:01 - OpenVPN > Opened utun device utun0 . 2017.04.04 16:33:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 16:33:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 16:33:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 10.4.53.187 10.4.53.187 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.53.187 255.255.0.0 . 2017.04.04 16:33:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.53.187 . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 213.152.162.164 192.168.0.1 255.255.255.255 . 2017.04.04 16:33:01 - OpenVPN > add net 213.152.162.164: gateway 192.168.0.1 . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 16:33:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 16:33:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 16:33:01 - Starting Management Interface . 2017.04.04 16:33:01 - OpenVPN > Initialization Sequence Completed I 2017.04.04 16:33:01 - DNS of a network adapter forced (Ethernet) I 2017.04.04 16:33:01 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 16:33:01 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 16:33:01 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 16:33:01 - Flushing DNS . 2017.04.04 16:33:01 - OS X - PF rules updated, reloading I 2017.04.04 16:33:01 - Checking route I 2017.04.04 16:33:02 - Checking DNS ! 2017.04.04 16:33:02 - Connected. . 2017.04.04 16:33:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 16:33:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 16:46:54 - Updating systems & servers data ... . 2017.04.04 16:46:55 - Systems & servers data update completed . 2017.04.04 17:17:51 - Updating systems & servers data ... . 2017.04.04 17:17:52 - Systems & servers data update completed . 2017.04.04 17:32:59 - OpenVPN > TLS: soft reset sec=0 bytes=32789571/0 pkts=61252/0 . 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 17:33:02 - OpenVPN > Validating certificate key usage . 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 17:33:02 - OpenVPN > VERIFY KU OK . 2017.04.04 17:33:02 - OpenVPN > Validating certificate extended key usage . 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 17:33:02 - OpenVPN > VERIFY EKU OK . 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:33:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 17:36:59 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.04 17:36:59 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 17:36:59 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 17:36:59 - OS X - PF rules updated, reloading ! 2017.04.04 17:36:59 - Disconnecting . 2017.04.04 17:36:59 - Management - Send 'signal SIGTERM' . 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 17:36:59 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 17:36:59 - OpenVPN > Exiting due to fatal error . 2017.04.04 17:37:00 - Connection terminated. I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 17:37:14 - Checking authorization ... ! 2017.04.04 17:37:14 - Connecting to Alterf (Netherlands, Alblasserdam) . 2017.04.04 17:37:14 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 17:37:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 17:37:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 17:37:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 17:37:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:14 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 17:37:14 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 17:37:14 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.169:443 . 2017.04.04 17:37:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.169:443, sid=ae5243c6 b8e4d400 . 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 17:37:14 - OpenVPN > Validating certificate key usage . 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 17:37:14 - OpenVPN > VERIFY KU OK . 2017.04.04 17:37:14 - OpenVPN > Validating certificate extended key usage . 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 17:37:14 - OpenVPN > VERIFY EKU OK . 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 17:37:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.169:443 . 2017.04.04 17:37:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 17:37:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.250 255.255.0.0' . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 17:37:23 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 17:37:23 - OpenVPN > Opened utun device utun0 . 2017.04.04 17:37:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 17:37:23 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 10.4.68.250 10.4.68.250 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.250 255.255.0.0 . 2017.04.04 17:37:23 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.250 . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 213.152.161.169 192.168.0.1 255.255.255.255 . 2017.04.04 17:37:23 - OpenVPN > add net 213.152.161.169: gateway 192.168.0.1 . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 17:37:23 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 17:37:23 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 17:37:23 - Starting Management Interface . 2017.04.04 17:37:23 - OpenVPN > Initialization Sequence Completed I 2017.04.04 17:37:23 - DNS of a network adapter forced (Ethernet) I 2017.04.04 17:37:23 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 17:37:23 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 17:37:23 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 17:37:23 - Flushing DNS . 2017.04.04 17:37:23 - OS X - PF rules updated, reloading I 2017.04.04 17:37:23 - Checking route I 2017.04.04 17:37:24 - Checking DNS ! 2017.04.04 17:37:24 - Connected. . 2017.04.04 17:37:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 17:37:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 17:48:45 - Updating systems & servers data ... . 2017.04.04 17:48:46 - Systems & servers data update completed . 2017.04.04 18:19:37 - Updating systems & servers data ... . 2017.04.04 18:19:38 - Systems & servers data update completed . 2017.04.04 18:37:20 - OpenVPN > TLS: soft reset sec=0 bytes=49281504/0 pkts=75148/0 . 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 18:37:20 - OpenVPN > Validating certificate key usage . 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 18:37:20 - OpenVPN > VERIFY KU OK . 2017.04.04 18:37:20 - OpenVPN > Validating certificate extended key usage . 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 18:37:20 - OpenVPN > VERIFY EKU OK . 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 18:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 18:50:29 - Updating systems & servers data ... . 2017.04.04 18:50:31 - Systems & servers data update completed . 2017.04.04 19:21:22 - Updating systems & servers data ... . 2017.04.04 19:21:24 - Systems & servers data update completed I 2017.04.04 19:37:20 - Renewing TLS key . 2017.04.04 19:37:20 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 19:37:26 - OpenVPN > Validating certificate key usage . 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 19:37:26 - OpenVPN > VERIFY KU OK . 2017.04.04 19:37:26 - OpenVPN > Validating certificate extended key usage . 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 19:37:26 - OpenVPN > VERIFY EKU OK . 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 19:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 19:52:15 - Updating systems & servers data ... . 2017.04.04 19:52:17 - Systems & servers data update completed . 2017.04.04 20:23:08 - Updating systems & servers data ... . 2017.04.04 20:23:09 - Systems & servers data update completed . 2017.04.04 20:37:26 - OpenVPN > TLS: soft reset sec=0 bytes=5063308/0 pkts=20058/0 . 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 20:37:26 - OpenVPN > Validating certificate key usage . 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 20:37:26 - OpenVPN > VERIFY KU OK . 2017.04.04 20:37:26 - OpenVPN > Validating certificate extended key usage . 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 20:37:26 - OpenVPN > VERIFY EKU OK . 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 20:37:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 20:54:01 - Updating systems & servers data ... . 2017.04.04 20:54:02 - Systems & servers data update completed . 2017.04.04 21:25:02 - Updating systems & servers data ... . 2017.04.04 21:25:02 - Systems & servers data update completed I 2017.04.04 21:37:26 - Renewing TLS key . 2017.04.04 21:37:26 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 21:37:32 - OpenVPN > TLS: soft reset sec=0 bytes=6429402/0 pkts=22343/0 . 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 21:37:32 - OpenVPN > Validating certificate key usage . 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 21:37:32 - OpenVPN > VERIFY KU OK . 2017.04.04 21:37:32 - OpenVPN > Validating certificate extended key usage . 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 21:37:32 - OpenVPN > VERIFY EKU OK . 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 21:37:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 21:55:10 - Updating systems & servers data ... . 2017.04.04 21:55:11 - Systems & servers data update completed . 2017.04.04 22:25:19 - Updating systems & servers data ... . 2017.04.04 22:25:20 - Systems & servers data update completed I 2017.04.04 22:37:32 - Renewing TLS key . 2017.04.04 22:37:32 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 22:37:41 - OpenVPN > TLS: soft reset sec=0 bytes=5115062/0 pkts=20304/0 . 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 22:37:41 - OpenVPN > Validating certificate key usage . 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 22:37:41 - OpenVPN > VERIFY KU OK . 2017.04.04 22:37:41 - OpenVPN > Validating certificate extended key usage . 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 22:37:41 - OpenVPN > VERIFY EKU OK . 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 22:37:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 22:55:27 - Updating systems & servers data ... . 2017.04.04 22:55:29 - Systems & servers data update completed . 2017.04.04 23:26:24 - Updating systems & servers data ... . 2017.04.04 23:26:25 - Systems & servers data update completed . 2017.04.04 23:27:41 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.04 23:27:41 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 23:27:41 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 23:27:41 - OS X - PF rules updated, reloading ! 2017.04.04 23:27:41 - Disconnecting . 2017.04.04 23:27:41 - Management - Send 'signal SIGTERM' . 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 23:27:41 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 23:27:41 - OpenVPN > Exiting due to fatal error . 2017.04.04 23:27:41 - Connection terminated. I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 23:27:56 - Checking authorization ... ! 2017.04.04 23:27:56 - Connecting to Alshat (Netherlands, Alblasserdam) . 2017.04.04 23:27:56 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 23:27:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 23:27:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 23:27:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 23:27:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:56 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 23:27:56 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 23:27:56 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.4:443 . 2017.04.04 23:27:56 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.4:443, sid=8afefa6f fea117d7 . 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 23:27:58 - OpenVPN > Validating certificate key usage . 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 23:27:58 - OpenVPN > VERIFY KU OK . 2017.04.04 23:27:58 - OpenVPN > Validating certificate extended key usage . 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 23:27:58 - OpenVPN > VERIFY EKU OK . 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 23:27:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.4:443 . 2017.04.04 23:28:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 23:28:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.151 255.255.0.0' . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 23:28:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 23:28:01 - OpenVPN > Opened utun device utun0 . 2017.04.04 23:28:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 23:28:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 10.4.68.151 10.4.68.151 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.151 255.255.0.0 . 2017.04.04 23:28:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.151 . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 213.152.161.4 192.168.0.1 255.255.255.255 . 2017.04.04 23:28:01 - OpenVPN > add net 213.152.161.4: gateway 192.168.0.1 . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 23:28:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 23:28:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 23:28:01 - Starting Management Interface . 2017.04.04 23:28:01 - OpenVPN > Initialization Sequence Completed I 2017.04.04 23:28:01 - DNS of a network adapter forced (Ethernet) I 2017.04.04 23:28:01 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 23:28:01 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 23:28:01 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 23:28:01 - Flushing DNS . 2017.04.04 23:28:01 - OS X - PF rules updated, reloading I 2017.04.04 23:28:01 - Checking route I 2017.04.04 23:28:04 - Checking DNS ! 2017.04.04 23:28:04 - Connected. . 2017.04.04 23:28:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 23:28:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 23:57:26 - Updating systems & servers data ... . 2017.04.04 23:57:26 - Systems & servers data update completed . 2017.04.05 00:27:29 - Updating systems & servers data ... . 2017.04.05 00:27:29 - Systems & servers data update completed . 2017.04.05 00:27:58 - OpenVPN > TLS: soft reset sec=0 bytes=91294170/0 pkts=283038/0 . 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.05 00:27:58 - OpenVPN > Validating certificate key usage . 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.05 00:27:58 - OpenVPN > VERIFY KU OK . 2017.04.05 00:27:58 - OpenVPN > Validating certificate extended key usage . 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.05 00:27:58 - OpenVPN > VERIFY EKU OK . 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.05 00:43:17 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.05 00:43:17 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.05 00:43:17 - OpenVPN > Restart pause, 2 second(s) . 2017.04.05 00:43:17 - OS X - PF rules updated, reloading ! 2017.04.05 00:43:17 - Disconnecting . 2017.04.05 00:43:17 - Management - Send 'signal SIGTERM' . 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.05 00:43:17 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.05 00:43:17 - OpenVPN > Exiting due to fatal error . 2017.04.05 00:43:17 - Connection terminated. I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.05 00:43:27 - Checking authorization ... ! 2017.04.05 00:43:28 - Connecting to Hydrus (Netherlands, Alblasserdam) . 2017.04.05 00:43:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.05 00:43:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.05 00:43:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.05 00:43:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.05 00:43:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:28 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.05 00:43:28 - OpenVPN > UDPv4 link local: [undef] . 2017.04.05 00:43:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.9:443 . 2017.04.05 00:43:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.9:443, sid=a3a5b645 7b31f16d . 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.05 00:43:39 - OpenVPN > Validating certificate key usage . 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.05 00:43:39 - OpenVPN > VERIFY KU OK . 2017.04.05 00:43:39 - OpenVPN > Validating certificate extended key usage . 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.05 00:43:39 - OpenVPN > VERIFY EKU OK . 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hydrus, emailAddress=info@airvpn.org . 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.05 00:43:39 - OpenVPN > [Hydrus] Peer Connection Initiated with [AF_INET]213.152.162.9:443 . 2017.04.05 00:43:41 - OpenVPN > SENT CONTROL [Hydrus]: 'PUSH_REQUEST' (status=1) . 2017.04.05 00:43:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.186 255.255.0.0,peer-id 4' . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.05 00:43:41 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.05 00:43:41 - OpenVPN > route: writing to routing socket: File exists . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2017.04.05 00:43:42 - OpenVPN > Opened utun device utun0 . 2017.04.05 00:43:42 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.05 00:43:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 10.4.5.186 10.4.5.186 netmask 255.255.0.0 mtu 1500 up . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.186 255.255.0.0 . 2017.04.05 00:43:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.186 . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 213.152.162.9 192.168.0.1 255.255.255.255 . 2017.04.05 00:43:42 - OpenVPN > add net 213.152.162.9: gateway 192.168.0.1: File exists . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.05 00:43:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.05 00:43:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.05 00:43:42 - Starting Management Interface . 2017.04.05 00:43:42 - OpenVPN > Initialization Sequence Completed I 2017.04.05 00:43:42 - DNS of a network adapter forced (Ethernet) I 2017.04.05 00:43:42 - DNS of a network adapter forced (Wi-Fi) I 2017.04.05 00:43:42 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.05 00:43:42 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.05 00:43:42 - Flushing DNS . 2017.04.05 00:43:42 - OS X - PF rules updated, reloading I 2017.04.05 00:43:42 - Checking route I 2017.04.05 00:43:46 - Checking DNS ! 2017.04.05 00:43:46 - Connected. . 2017.04.05 00:43:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.05 00:43:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.05 00:58:22 - Updating systems & servers data ... . 2017.04.05 00:58:25 - Systems & servers data update completed The graph is upload / download over the period of an hour. The software used is "little snitch", which is firewall permission software if that helps.
  4. There's no huge button if you're already connected to a server. In order to enable the feature that prevents your IP from leaking, you have to do something that causes your IP to leak (disconnect). Do you see my conundrum? Maybe the option could be persistent?
  5. The connection is constantly dropping out for me, and it's really annoying. Am I the only one? This is over an hour period. Green is download, as shown by the 3 sections of radio silence. The drops are typically 20-40 seconds. This has been happening for a few weeks now. Log . 2017.04.03 14:34:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.03 14:34:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.03 14:34:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.03 14:34:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:09 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.03 14:34:09 - OpenVPN > UDPv4 link local: [undef] . 2017.04.03 14:34:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443 . 2017.04.03 14:34:12 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=7d38e23d 4c09a0c0 . 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 14:34:12 - OpenVPN > Validating certificate key usage . 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 14:34:12 - OpenVPN > VERIFY KU OK . 2017.04.03 14:34:12 - OpenVPN > Validating certificate extended key usage . 2017.04.03 14:34:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 14:34:12 - OpenVPN > VERIFY EKU OK . 2017.04.03 14:34:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 14:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 14:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 14:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 14:34:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443 . 2017.04.03 14:34:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.03 14:34:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0' . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.03 14:34:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.03 14:34:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.03 14:34:17 - OpenVPN > Opened utun device utun0 . 2017.04.03 14:34:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.03 14:34:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.03 14:34:17 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0 . 2017.04.03 14:34:17 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23 . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255 . 2017.04.03 14:34:17 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1 . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.03 14:34:17 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.03 14:34:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.03 14:34:17 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.03 14:34:17 - Starting Management Interface . 2017.04.03 14:34:17 - OpenVPN > Initialization Sequence Completed I 2017.04.03 14:34:17 - DNS of a network adapter forced (Ethernet) I 2017.04.03 14:34:17 - DNS of a network adapter forced (Wi-Fi) I 2017.04.03 14:34:17 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.03 14:34:17 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.03 14:34:17 - Flushing DNS . 2017.04.03 14:34:18 - OS X - PF rules updated, reloading I 2017.04.03 14:34:18 - Checking route I 2017.04.03 14:34:19 - Checking DNS ! 2017.04.03 14:34:19 - Connected. . 2017.04.03 14:34:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.03 14:34:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.03 14:36:43 - Updating systems & servers data ... . 2017.04.03 14:36:44 - Systems & servers data update completed . 2017.04.03 15:07:38 - Updating systems & servers data ... . 2017.04.03 15:07:39 - Systems & servers data update completed . 2017.04.03 15:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=114372764/0 pkts=286783/0 . 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 15:34:15 - OpenVPN > Validating certificate key usage . 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 15:34:15 - OpenVPN > VERIFY KU OK . 2017.04.03 15:34:15 - OpenVPN > Validating certificate extended key usage . 2017.04.03 15:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 15:34:15 - OpenVPN > VERIFY EKU OK . 2017.04.03 15:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 15:34:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 15:34:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 15:34:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 15:37:52 - Updating systems & servers data ... . 2017.04.03 15:37:52 - Systems & servers data update completed . 2017.04.03 16:08:06 - Updating systems & servers data ... . 2017.04.03 16:08:25 - Systems & servers data update completed . 2017.04.03 16:34:15 - OpenVPN > TLS: soft reset sec=0 bytes=55751057/0 pkts=312959/0 . 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 16:34:15 - OpenVPN > Validating certificate key usage . 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 16:34:15 - OpenVPN > VERIFY KU OK . 2017.04.03 16:34:15 - OpenVPN > Validating certificate extended key usage . 2017.04.03 16:34:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 16:34:15 - OpenVPN > VERIFY EKU OK . 2017.04.03 16:34:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 16:34:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 16:34:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 16:34:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 16:38:16 - Updating systems & servers data ... . 2017.04.03 16:38:16 - Systems & servers data update completed . 2017.04.03 17:09:12 - Updating systems & servers data ... . 2017.04.03 17:09:12 - OS X - PF rules updated, reloading . 2017.04.03 17:09:13 - Systems & servers data update completed I 2017.04.03 17:34:15 - Renewing TLS key . 2017.04.03 17:34:15 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 17:34:17 - OpenVPN > TLS: soft reset sec=0 bytes=15102625/0 pkts=42253/0 . 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 17:34:17 - OpenVPN > Validating certificate key usage . 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 17:34:17 - OpenVPN > VERIFY KU OK . 2017.04.03 17:34:17 - OpenVPN > Validating certificate extended key usage . 2017.04.03 17:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 17:34:17 - OpenVPN > VERIFY EKU OK . 2017.04.03 17:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 17:34:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 17:34:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 17:34:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 17:40:08 - Updating systems & servers data ... . 2017.04.03 17:40:09 - Systems & servers data update completed . 2017.04.03 18:11:04 - Updating systems & servers data ... . 2017.04.03 18:11:06 - Systems & servers data update completed I 2017.04.03 18:34:17 - Renewing TLS key . 2017.04.03 18:34:17 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 18:34:19 - OpenVPN > TLS: soft reset sec=0 bytes=13987374/0 pkts=40248/0 . 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 18:34:19 - OpenVPN > Validating certificate key usage . 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 18:34:19 - OpenVPN > VERIFY KU OK . 2017.04.03 18:34:19 - OpenVPN > Validating certificate extended key usage . 2017.04.03 18:34:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 18:34:19 - OpenVPN > VERIFY EKU OK . 2017.04.03 18:34:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 18:34:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 18:34:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 18:34:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 18:42:02 - Updating systems & servers data ... . 2017.04.03 18:42:02 - Systems & servers data update completed . 2017.04.03 19:13:01 - Updating systems & servers data ... . 2017.04.03 19:13:03 - Systems & servers data update completed I 2017.04.03 19:34:19 - Renewing TLS key . 2017.04.03 19:34:19 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 19:34:27 - OpenVPN > TLS: soft reset sec=0 bytes=43321137/0 pkts=83190/0 . 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 19:34:27 - OpenVPN > Validating certificate key usage . 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 19:34:27 - OpenVPN > VERIFY KU OK . 2017.04.03 19:34:27 - OpenVPN > Validating certificate extended key usage . 2017.04.03 19:34:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 19:34:27 - OpenVPN > VERIFY EKU OK . 2017.04.03 19:34:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 19:34:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 19:34:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 19:34:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 19:43:09 - Updating systems & servers data ... . 2017.04.03 19:43:10 - Systems & servers data update completed . 2017.04.03 20:14:08 - Updating systems & servers data ... . 2017.04.03 20:14:08 - Systems & servers data update completed I 2017.04.03 20:34:27 - Renewing TLS key . 2017.04.03 20:34:27 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 20:34:35 - OpenVPN > TLS: soft reset sec=0 bytes=406592114/0 pkts=529431/0 . 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 20:34:35 - OpenVPN > Validating certificate key usage . 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 20:34:35 - OpenVPN > VERIFY KU OK . 2017.04.03 20:34:35 - OpenVPN > Validating certificate extended key usage . 2017.04.03 20:34:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 20:34:35 - OpenVPN > VERIFY EKU OK . 2017.04.03 20:34:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 20:34:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 20:34:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 20:34:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 20:45:04 - Updating systems & servers data ... . 2017.04.03 20:45:06 - Systems & servers data update completed . 2017.04.03 21:15:56 - Updating systems & servers data ... . 2017.04.03 21:15:57 - Systems & servers data update completed I 2017.04.03 21:34:35 - Renewing TLS key . 2017.04.03 21:34:35 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 21:34:36 - OpenVPN > TLS: soft reset sec=0 bytes=74188922/0 pkts=107635/0 . 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 21:34:36 - OpenVPN > Validating certificate key usage . 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 21:34:36 - OpenVPN > VERIFY KU OK . 2017.04.03 21:34:36 - OpenVPN > Validating certificate extended key usage . 2017.04.03 21:34:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 21:34:36 - OpenVPN > VERIFY EKU OK . 2017.04.03 21:34:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 21:34:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 21:34:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 21:34:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 21:46:47 - Updating systems & servers data ... . 2017.04.03 21:46:48 - Systems & servers data update completed . 2017.04.03 22:17:41 - Updating systems & servers data ... . 2017.04.03 22:17:43 - Systems & servers data update completed I 2017.04.03 22:34:36 - Renewing TLS key . 2017.04.03 22:34:36 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 22:34:44 - OpenVPN > TLS: soft reset sec=0 bytes=155541345/0 pkts=191560/0 . 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 22:34:44 - OpenVPN > Validating certificate key usage . 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 22:34:44 - OpenVPN > VERIFY KU OK . 2017.04.03 22:34:44 - OpenVPN > Validating certificate extended key usage . 2017.04.03 22:34:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 22:34:44 - OpenVPN > VERIFY EKU OK . 2017.04.03 22:34:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 22:34:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 22:34:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 22:34:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 22:48:38 - Updating systems & servers data ... . 2017.04.03 22:48:39 - Systems & servers data update completed . 2017.04.03 23:19:34 - Updating systems & servers data ... . 2017.04.03 23:19:36 - Systems & servers data update completed I 2017.04.03 23:34:44 - Renewing TLS key . 2017.04.03 23:34:44 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.03 23:34:50 - OpenVPN > TLS: soft reset sec=0 bytes=543820781/0 pkts=624008/0 . 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.03 23:34:50 - OpenVPN > Validating certificate key usage . 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.03 23:34:50 - OpenVPN > VERIFY KU OK . 2017.04.03 23:34:50 - OpenVPN > Validating certificate extended key usage . 2017.04.03 23:34:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.03 23:34:50 - OpenVPN > VERIFY EKU OK . 2017.04.03 23:34:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 23:34:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.03 23:34:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.03 23:34:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.03 23:50:31 - Updating systems & servers data ... . 2017.04.03 23:50:32 - Systems & servers data update completed . 2017.04.04 00:21:28 - Updating systems & servers data ... . 2017.04.04 00:21:36 - Systems & servers data update completed I 2017.04.04 00:34:50 - Renewing TLS key . 2017.04.04 00:34:50 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 00:34:51 - OpenVPN > TLS: soft reset sec=0 bytes=298572455/0 pkts=329031/0 . 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 00:34:51 - OpenVPN > Validating certificate key usage . 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 00:34:51 - OpenVPN > VERIFY KU OK . 2017.04.04 00:34:51 - OpenVPN > Validating certificate extended key usage . 2017.04.04 00:34:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 00:34:51 - OpenVPN > VERIFY EKU OK . 2017.04.04 00:34:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 00:34:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 00:34:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 00:34:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 00:51:34 - Updating systems & servers data ... . 2017.04.04 00:51:35 - Systems & servers data update completed . 2017.04.04 01:22:29 - Updating systems & servers data ... . 2017.04.04 01:22:31 - Systems & servers data update completed I 2017.04.04 01:34:51 - Renewing TLS key . 2017.04.04 01:34:51 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 01:34:54 - OpenVPN > TLS: soft reset sec=0 bytes=304191023/0 pkts=343770/0 . 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 01:34:54 - OpenVPN > Validating certificate key usage . 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 01:34:54 - OpenVPN > VERIFY KU OK . 2017.04.04 01:34:54 - OpenVPN > Validating certificate extended key usage . 2017.04.04 01:34:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 01:34:54 - OpenVPN > VERIFY EKU OK . 2017.04.04 01:34:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 01:35:00 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 01:35:00 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 01:35:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 01:53:27 - Updating systems & servers data ... . 2017.04.04 01:53:28 - Systems & servers data update completed . 2017.04.04 02:23:35 - Updating systems & servers data ... . 2017.04.04 02:23:37 - Systems & servers data update completed I 2017.04.04 02:34:54 - Renewing TLS key . 2017.04.04 02:34:54 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 02:35:00 - OpenVPN > Validating certificate key usage . 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 02:35:00 - OpenVPN > VERIFY KU OK . 2017.04.04 02:35:00 - OpenVPN > Validating certificate extended key usage . 2017.04.04 02:35:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 02:35:00 - OpenVPN > VERIFY EKU OK . 2017.04.04 02:35:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 02:35:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 02:35:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 02:35:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 02:46:45 - OS X - PF rules updated, reloading ! 2017.04.04 02:46:45 - Disconnecting . 2017.04.04 02:46:45 - Management - Send 'signal SIGTERM' . 2017.04.04 02:46:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 02:46:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 213.152.162.98 192.168.0.1 255.255.255.255 . 2017.04.04 02:46:50 - OpenVPN > delete net 213.152.162.98: gateway 192.168.0.1 . 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 02:46:50 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 02:46:50 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 02:46:50 - Connection terminated. I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Ethernet) . 2017.04.04 02:46:50 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 02:46:50 - OpenVPN > Closing TUN/TAP interface . 2017.04.04 02:46:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 02:46:50 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Ethernet) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Wi-Fi) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Bluetooth PAN) I 2017.04.04 02:46:50 - IPv6 restored on network adapter (Thunderbolt Bridge) ! 2017.04.04 02:46:50 - Session terminated. . 2017.04.04 02:53:41 - Updating systems & servers data ... . 2017.04.04 02:53:41 - Systems & servers data update completed . 2017.04.04 03:24:35 - Updating systems & servers data ... . 2017.04.04 03:24:36 - Systems & servers data update completed . 2017.04.04 03:55:30 - Updating systems & servers data ... . 2017.04.04 03:55:30 - Systems & servers data update completed . 2017.04.04 04:26:24 - Updating systems & servers data ... . 2017.04.04 04:26:25 - Systems & servers data update completed . 2017.04.04 04:57:19 - Updating systems & servers data ... . 2017.04.04 04:57:20 - Systems & servers data update completed . 2017.04.04 05:28:14 - Updating systems & servers data ... . 2017.04.04 05:28:14 - Systems & servers data update completed . 2017.04.04 05:59:09 - Updating systems & servers data ... . 2017.04.04 05:59:09 - Systems & servers data update completed . 2017.04.04 06:30:03 - Updating systems & servers data ... . 2017.04.04 06:30:04 - Systems & servers data update completed . 2017.04.04 07:00:58 - Updating systems & servers data ... . 2017.04.04 07:00:59 - Systems & servers data update completed . 2017.04.04 07:31:53 - Updating systems & servers data ... . 2017.04.04 07:31:53 - Systems & servers data update completed . 2017.04.04 08:02:48 - Updating systems & servers data ... . 2017.04.04 08:02:48 - Systems & servers data update completed . 2017.04.04 08:33:42 - Updating systems & servers data ... . 2017.04.04 08:33:42 - Systems & servers data update completed . 2017.04.04 09:04:36 - Updating systems & servers data ... . 2017.04.04 09:04:37 - Systems & servers data update completed . 2017.04.04 09:35:31 - Updating systems & servers data ... . 2017.04.04 09:35:32 - Systems & servers data update completed . 2017.04.04 10:06:26 - Updating systems & servers data ... . 2017.04.04 10:06:26 - Systems & servers data update completed . 2017.04.04 10:37:21 - Updating systems & servers data ... . 2017.04.04 10:37:21 - Systems & servers data update completed . 2017.04.04 11:08:16 - Updating systems & servers data ... . 2017.04.04 11:08:16 - Systems & servers data update completed . 2017.04.04 11:39:11 - Updating systems & servers data ... . 2017.04.04 11:39:11 - Systems & servers data update completed . 2017.04.04 12:10:05 - Updating systems & servers data ... . 2017.04.04 12:10:06 - Systems & servers data update completed . 2017.04.04 12:41:00 - Updating systems & servers data ... . 2017.04.04 12:41:01 - Systems & servers data update completed I 2017.04.04 12:43:48 - Session starting. I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Ethernet) I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Wi-Fi) I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Bluetooth PAN) I 2017.04.04 12:43:48 - IPv6 disabled on network adapter (Thunderbolt Bridge) I 2017.04.04 12:43:48 - Checking authorization ... ! 2017.04.04 12:43:49 - Connecting to Gienah (Netherlands, Alblasserdam) . 2017.04.04 12:43:49 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 12:43:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 12:43:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 12:43:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 12:43:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:49 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 12:43:49 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 12:43:49 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443 . 2017.04.04 12:43:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=0359c113 770eb6f0 . 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 12:43:49 - OpenVPN > Validating certificate key usage . 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 12:43:49 - OpenVPN > VERIFY KU OK . 2017.04.04 12:43:49 - OpenVPN > Validating certificate extended key usage . 2017.04.04 12:43:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 12:43:49 - OpenVPN > VERIFY EKU OK . 2017.04.04 12:43:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 12:43:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 12:43:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 12:43:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 12:43:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443 . 2017.04.04 12:43:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 12:43:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.70.97 255.255.0.0' . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 12:43:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 12:43:53 - OpenVPN > route: writing to routing socket: File exists . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 12:43:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 12:43:53 - OpenVPN > Opened utun device utun0 . 2017.04.04 12:43:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 12:43:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 12:43:53 - OpenVPN > /sbin/ifconfig utun0 10.4.70.97 10.4.70.97 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.70.97 255.255.0.0 . 2017.04.04 12:43:53 - OpenVPN > add net 10.4.0.0: gateway 10.4.70.97 . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 213.152.162.93 192.168.0.1 255.255.255.255 . 2017.04.04 12:43:53 - OpenVPN > add net 213.152.162.93: gateway 192.168.0.1: File exists . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 12:43:53 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 12:43:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 12:43:53 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 12:43:53 - Starting Management Interface . 2017.04.04 12:43:53 - OpenVPN > Initialization Sequence Completed I 2017.04.04 12:43:53 - DNS of a network adapter forced (Ethernet) I 2017.04.04 12:43:53 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 12:43:53 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 12:43:53 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 12:43:53 - Flushing DNS . 2017.04.04 12:43:53 - OS X - PF rules updated, reloading I 2017.04.04 12:43:53 - Checking route I 2017.04.04 12:43:54 - Checking DNS ! 2017.04.04 12:43:54 - Connected. . 2017.04.04 12:43:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 12:43:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 13:11:57 - Updating systems & servers data ... . 2017.04.04 13:12:00 - Systems & servers data update completed . 2017.04.04 13:42:58 - Updating systems & servers data ... . 2017.04.04 13:42:59 - Systems & servers data update completed . 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 13:43:50 - OpenVPN > Validating certificate key usage . 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 13:43:50 - OpenVPN > VERIFY KU OK . 2017.04.04 13:43:50 - OpenVPN > Validating certificate extended key usage . 2017.04.04 13:43:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 13:43:50 - OpenVPN > VERIFY EKU OK . 2017.04.04 13:43:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 13:43:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 13:43:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 13:43:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 14:12:59 - Updating systems & servers data ... . 2017.04.04 14:12:59 - Systems & servers data update completed . 2017.04.04 14:43:01 - Updating systems & servers data ... . 2017.04.04 14:43:02 - Systems & servers data update completed I 2017.04.04 14:43:50 - Renewing TLS key . 2017.04.04 14:43:50 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 14:43:53 - OpenVPN > TLS: soft reset sec=0 bytes=13993207/0 pkts=33370/0 . 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 14:43:54 - OpenVPN > Validating certificate key usage . 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 14:43:54 - OpenVPN > VERIFY KU OK . 2017.04.04 14:43:54 - OpenVPN > Validating certificate extended key usage . 2017.04.04 14:43:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 14:43:54 - OpenVPN > VERIFY EKU OK . 2017.04.04 14:43:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 14:43:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 14:43:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 14:43:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 15:14:03 - Updating systems & servers data ... . 2017.04.04 15:14:03 - Systems & servers data update completed . 2017.04.04 15:31:13 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.04 15:31:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 15:31:13 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 15:31:13 - OS X - PF rules updated, reloading ! 2017.04.04 15:31:13 - Disconnecting . 2017.04.04 15:31:13 - Management - Send 'signal SIGTERM' . 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 15:31:13 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 15:31:13 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 15:31:13 - OpenVPN > Exiting due to fatal error . 2017.04.04 15:31:14 - Connection terminated. I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 15:31:14 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 15:31:26 - Checking authorization ... ! 2017.04.04 15:31:26 - Connecting to Subra (Netherlands, Alblasserdam) . 2017.04.04 15:31:26 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 15:31:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 15:31:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 15:31:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 15:31:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:26 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 15:31:26 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 15:31:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.98:443 . 2017.04.04 15:31:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.98:443, sid=82cabec5 26b9b800 . 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 15:31:30 - OpenVPN > Validating certificate key usage . 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 15:31:30 - OpenVPN > VERIFY KU OK . 2017.04.04 15:31:30 - OpenVPN > Validating certificate extended key usage . 2017.04.04 15:31:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 15:31:30 - OpenVPN > VERIFY EKU OK . 2017.04.04 15:31:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 15:31:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 15:31:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 15:31:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 15:31:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.98:443 . 2017.04.04 15:31:36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 15:31:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.23 255.255.0.0' . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 15:31:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 15:31:36 - OpenVPN > Opened utun device utun0 . 2017.04.04 15:31:36 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 15:31:36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 15:31:36 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 15:31:36 - OpenVPN > /sbin/ifconfig utun0 10.4.68.23 10.4.68.23 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.23 255.255.0.0 . 2017.04.04 15:31:36 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.23 . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 213.152.162.98 192.168.0.1 255.255.255.255 . 2017.04.04 15:31:36 - OpenVPN > add net 213.152.162.98: gateway 192.168.0.1 . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 15:31:36 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 15:31:36 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 15:31:36 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 15:31:36 - Starting Management Interface . 2017.04.04 15:31:36 - OpenVPN > Initialization Sequence Completed I 2017.04.04 15:31:36 - DNS of a network adapter forced (Ethernet) I 2017.04.04 15:31:36 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 15:31:36 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 15:31:36 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 15:31:36 - Flushing DNS . 2017.04.04 15:31:36 - OS X - PF rules updated, reloading I 2017.04.04 15:31:36 - Checking route I 2017.04.04 15:31:37 - Checking DNS ! 2017.04.04 15:31:37 - Connected. . 2017.04.04 15:31:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 15:31:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 15:44:59 - Updating systems & servers data ... . 2017.04.04 15:45:00 - Systems & servers data update completed . 2017.04.04 16:15:55 - Updating systems & servers data ... . 2017.04.04 16:15:57 - Systems & servers data update completed . 2017.04.04 16:31:33 - OpenVPN > TLS: soft reset sec=0 bytes=5887067/0 pkts=22098/0 . 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 16:31:33 - OpenVPN > Validating certificate key usage . 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 16:31:33 - OpenVPN > VERIFY KU OK . 2017.04.04 16:31:33 - OpenVPN > Validating certificate extended key usage . 2017.04.04 16:31:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 16:31:33 - OpenVPN > VERIFY EKU OK . 2017.04.04 16:31:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2017.04.04 16:32:33 - OpenVPN > TLS Error: TLS handshake failed . 2017.04.04 16:32:33 - OpenVPN > TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1 . 2017.04.04 16:32:34 - OpenVPN > [uNDEF] Inactivity timeout (--ping-restart), restarting . 2017.04.04 16:32:34 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 16:32:34 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 16:32:34 - OS X - PF rules updated, reloading ! 2017.04.04 16:32:34 - Disconnecting . 2017.04.04 16:32:34 - Management - Send 'signal SIGTERM' . 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 16:32:34 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 16:32:34 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 16:32:34 - OpenVPN > Exiting due to fatal error . 2017.04.04 16:32:34 - Connection terminated. I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 16:32:34 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 16:32:48 - Checking authorization ... ! 2017.04.04 16:32:48 - Connecting to Ancha (Netherlands, Alblasserdam) . 2017.04.04 16:32:48 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 16:32:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 16:32:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 16:32:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 16:32:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:48 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 16:32:48 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 16:32:48 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.164:443 . 2017.04.04 16:32:48 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.164:443, sid=a3668ad5 f28645b8 . 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 16:32:48 - OpenVPN > Validating certificate key usage . 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 16:32:48 - OpenVPN > VERIFY KU OK . 2017.04.04 16:32:48 - OpenVPN > Validating certificate extended key usage . 2017.04.04 16:32:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 16:32:48 - OpenVPN > VERIFY EKU OK . 2017.04.04 16:32:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 16:32:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 16:32:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 16:32:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 16:32:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.164:443 . 2017.04.04 16:33:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 16:33:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.53.187 255.255.0.0' . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 16:33:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 16:33:01 - OpenVPN > Opened utun device utun0 . 2017.04.04 16:33:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 16:33:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 16:33:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 16:33:01 - OpenVPN > /sbin/ifconfig utun0 10.4.53.187 10.4.53.187 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.53.187 255.255.0.0 . 2017.04.04 16:33:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.53.187 . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 213.152.162.164 192.168.0.1 255.255.255.255 . 2017.04.04 16:33:01 - OpenVPN > add net 213.152.162.164: gateway 192.168.0.1 . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 16:33:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 16:33:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 16:33:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 16:33:01 - Starting Management Interface . 2017.04.04 16:33:01 - OpenVPN > Initialization Sequence Completed I 2017.04.04 16:33:01 - DNS of a network adapter forced (Ethernet) I 2017.04.04 16:33:01 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 16:33:01 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 16:33:01 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 16:33:01 - Flushing DNS . 2017.04.04 16:33:01 - OS X - PF rules updated, reloading I 2017.04.04 16:33:01 - Checking route I 2017.04.04 16:33:02 - Checking DNS ! 2017.04.04 16:33:02 - Connected. . 2017.04.04 16:33:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 16:33:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 16:46:54 - Updating systems & servers data ... . 2017.04.04 16:46:55 - Systems & servers data update completed . 2017.04.04 17:17:51 - Updating systems & servers data ... . 2017.04.04 17:17:52 - Systems & servers data update completed . 2017.04.04 17:32:59 - OpenVPN > TLS: soft reset sec=0 bytes=32789571/0 pkts=61252/0 . 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 17:33:02 - OpenVPN > Validating certificate key usage . 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 17:33:02 - OpenVPN > VERIFY KU OK . 2017.04.04 17:33:02 - OpenVPN > Validating certificate extended key usage . 2017.04.04 17:33:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 17:33:02 - OpenVPN > VERIFY EKU OK . 2017.04.04 17:33:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:33:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:33:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:33:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 17:36:59 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.04 17:36:59 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 17:36:59 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 17:36:59 - OS X - PF rules updated, reloading ! 2017.04.04 17:36:59 - Disconnecting . 2017.04.04 17:36:59 - Management - Send 'signal SIGTERM' . 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 17:36:59 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 17:36:59 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 17:36:59 - OpenVPN > Exiting due to fatal error . 2017.04.04 17:37:00 - Connection terminated. I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 17:37:00 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 17:37:14 - Checking authorization ... ! 2017.04.04 17:37:14 - Connecting to Alterf (Netherlands, Alblasserdam) . 2017.04.04 17:37:14 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 17:37:14 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 17:37:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 17:37:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 17:37:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:14 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 17:37:14 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 17:37:14 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.169:443 . 2017.04.04 17:37:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.169:443, sid=ae5243c6 b8e4d400 . 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 17:37:14 - OpenVPN > Validating certificate key usage . 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 17:37:14 - OpenVPN > VERIFY KU OK . 2017.04.04 17:37:14 - OpenVPN > Validating certificate extended key usage . 2017.04.04 17:37:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 17:37:14 - OpenVPN > VERIFY EKU OK . 2017.04.04 17:37:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:37:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 17:37:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 17:37:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 17:37:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.169:443 . 2017.04.04 17:37:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 17:37:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.250 255.255.0.0' . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 17:37:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 17:37:23 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 17:37:23 - OpenVPN > Opened utun device utun0 . 2017.04.04 17:37:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 17:37:23 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 17:37:23 - OpenVPN > /sbin/ifconfig utun0 10.4.68.250 10.4.68.250 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.250 255.255.0.0 . 2017.04.04 17:37:23 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.250 . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 213.152.161.169 192.168.0.1 255.255.255.255 . 2017.04.04 17:37:23 - OpenVPN > add net 213.152.161.169: gateway 192.168.0.1 . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 17:37:23 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 17:37:23 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 17:37:23 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 17:37:23 - Starting Management Interface . 2017.04.04 17:37:23 - OpenVPN > Initialization Sequence Completed I 2017.04.04 17:37:23 - DNS of a network adapter forced (Ethernet) I 2017.04.04 17:37:23 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 17:37:23 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 17:37:23 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 17:37:23 - Flushing DNS . 2017.04.04 17:37:23 - OS X - PF rules updated, reloading I 2017.04.04 17:37:23 - Checking route I 2017.04.04 17:37:24 - Checking DNS ! 2017.04.04 17:37:24 - Connected. . 2017.04.04 17:37:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 17:37:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 17:48:45 - Updating systems & servers data ... . 2017.04.04 17:48:46 - Systems & servers data update completed . 2017.04.04 18:19:37 - Updating systems & servers data ... . 2017.04.04 18:19:38 - Systems & servers data update completed . 2017.04.04 18:37:20 - OpenVPN > TLS: soft reset sec=0 bytes=49281504/0 pkts=75148/0 . 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 18:37:20 - OpenVPN > Validating certificate key usage . 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 18:37:20 - OpenVPN > VERIFY KU OK . 2017.04.04 18:37:20 - OpenVPN > Validating certificate extended key usage . 2017.04.04 18:37:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 18:37:20 - OpenVPN > VERIFY EKU OK . 2017.04.04 18:37:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 18:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 18:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 18:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 18:50:29 - Updating systems & servers data ... . 2017.04.04 18:50:31 - Systems & servers data update completed . 2017.04.04 19:21:22 - Updating systems & servers data ... . 2017.04.04 19:21:24 - Systems & servers data update completed I 2017.04.04 19:37:20 - Renewing TLS key . 2017.04.04 19:37:20 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 19:37:26 - OpenVPN > Validating certificate key usage . 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 19:37:26 - OpenVPN > VERIFY KU OK . 2017.04.04 19:37:26 - OpenVPN > Validating certificate extended key usage . 2017.04.04 19:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 19:37:26 - OpenVPN > VERIFY EKU OK . 2017.04.04 19:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 19:37:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 19:37:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 19:37:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 19:52:15 - Updating systems & servers data ... . 2017.04.04 19:52:17 - Systems & servers data update completed . 2017.04.04 20:23:08 - Updating systems & servers data ... . 2017.04.04 20:23:09 - Systems & servers data update completed . 2017.04.04 20:37:26 - OpenVPN > TLS: soft reset sec=0 bytes=5063308/0 pkts=20058/0 . 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 20:37:26 - OpenVPN > Validating certificate key usage . 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 20:37:26 - OpenVPN > VERIFY KU OK . 2017.04.04 20:37:26 - OpenVPN > Validating certificate extended key usage . 2017.04.04 20:37:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 20:37:26 - OpenVPN > VERIFY EKU OK . 2017.04.04 20:37:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 20:37:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 20:37:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 20:37:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 20:54:01 - Updating systems & servers data ... . 2017.04.04 20:54:02 - Systems & servers data update completed . 2017.04.04 21:25:02 - Updating systems & servers data ... . 2017.04.04 21:25:02 - Systems & servers data update completed I 2017.04.04 21:37:26 - Renewing TLS key . 2017.04.04 21:37:26 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 21:37:32 - OpenVPN > TLS: soft reset sec=0 bytes=6429402/0 pkts=22343/0 . 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 21:37:32 - OpenVPN > Validating certificate key usage . 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 21:37:32 - OpenVPN > VERIFY KU OK . 2017.04.04 21:37:32 - OpenVPN > Validating certificate extended key usage . 2017.04.04 21:37:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 21:37:32 - OpenVPN > VERIFY EKU OK . 2017.04.04 21:37:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 21:37:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 21:37:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 21:37:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 21:55:10 - Updating systems & servers data ... . 2017.04.04 21:55:11 - Systems & servers data update completed . 2017.04.04 22:25:19 - Updating systems & servers data ... . 2017.04.04 22:25:20 - Systems & servers data update completed I 2017.04.04 22:37:32 - Renewing TLS key . 2017.04.04 22:37:32 - OpenVPN > TLS: tls_process: killed expiring key . 2017.04.04 22:37:41 - OpenVPN > TLS: soft reset sec=0 bytes=5115062/0 pkts=20304/0 . 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 22:37:41 - OpenVPN > Validating certificate key usage . 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 22:37:41 - OpenVPN > VERIFY KU OK . 2017.04.04 22:37:41 - OpenVPN > Validating certificate extended key usage . 2017.04.04 22:37:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 22:37:41 - OpenVPN > VERIFY EKU OK . 2017.04.04 22:37:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 22:37:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 22:37:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 22:37:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 22:55:27 - Updating systems & servers data ... . 2017.04.04 22:55:29 - Systems & servers data update completed . 2017.04.04 23:26:24 - Updating systems & servers data ... . 2017.04.04 23:26:25 - Systems & servers data update completed . 2017.04.04 23:27:41 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.04 23:27:41 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.04 23:27:41 - OpenVPN > Restart pause, 2 second(s) . 2017.04.04 23:27:41 - OS X - PF rules updated, reloading ! 2017.04.04 23:27:41 - Disconnecting . 2017.04.04 23:27:41 - Management - Send 'signal SIGTERM' . 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.04 23:27:41 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.04 23:27:41 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.04 23:27:41 - OpenVPN > Exiting due to fatal error . 2017.04.04 23:27:41 - Connection terminated. I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.04 23:27:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.04 23:27:56 - Checking authorization ... ! 2017.04.04 23:27:56 - Connecting to Alshat (Netherlands, Alblasserdam) . 2017.04.04 23:27:56 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.04 23:27:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.04 23:27:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.04 23:27:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.04 23:27:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:56 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.04 23:27:56 - OpenVPN > UDPv4 link local: [undef] . 2017.04.04 23:27:56 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.4:443 . 2017.04.04 23:27:56 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.4:443, sid=8afefa6f fea117d7 . 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.04 23:27:58 - OpenVPN > Validating certificate key usage . 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.04 23:27:58 - OpenVPN > VERIFY KU OK . 2017.04.04 23:27:58 - OpenVPN > Validating certificate extended key usage . 2017.04.04 23:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.04 23:27:58 - OpenVPN > VERIFY EKU OK . 2017.04.04 23:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 23:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.04 23:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.04 23:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.04 23:27:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.4:443 . 2017.04.04 23:28:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2017.04.04 23:28:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.151 255.255.0.0' . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.04 23:28:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.04 23:28:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.04 23:28:01 - OpenVPN > Opened utun device utun0 . 2017.04.04 23:28:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.04 23:28:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.04 23:28:01 - OpenVPN > /sbin/ifconfig utun0 10.4.68.151 10.4.68.151 netmask 255.255.0.0 mtu 1500 up . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.151 255.255.0.0 . 2017.04.04 23:28:01 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.151 . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 213.152.161.4 192.168.0.1 255.255.255.255 . 2017.04.04 23:28:01 - OpenVPN > add net 213.152.161.4: gateway 192.168.0.1 . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 23:28:01 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.04 23:28:01 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.04 23:28:01 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.04 23:28:01 - Starting Management Interface . 2017.04.04 23:28:01 - OpenVPN > Initialization Sequence Completed I 2017.04.04 23:28:01 - DNS of a network adapter forced (Ethernet) I 2017.04.04 23:28:01 - DNS of a network adapter forced (Wi-Fi) I 2017.04.04 23:28:01 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.04 23:28:01 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.04 23:28:01 - Flushing DNS . 2017.04.04 23:28:01 - OS X - PF rules updated, reloading I 2017.04.04 23:28:01 - Checking route I 2017.04.04 23:28:04 - Checking DNS ! 2017.04.04 23:28:04 - Connected. . 2017.04.04 23:28:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.04 23:28:04 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.04 23:57:26 - Updating systems & servers data ... . 2017.04.04 23:57:26 - Systems & servers data update completed . 2017.04.05 00:27:29 - Updating systems & servers data ... . 2017.04.05 00:27:29 - Systems & servers data update completed . 2017.04.05 00:27:58 - OpenVPN > TLS: soft reset sec=0 bytes=91294170/0 pkts=283038/0 . 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.05 00:27:58 - OpenVPN > Validating certificate key usage . 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.05 00:27:58 - OpenVPN > VERIFY KU OK . 2017.04.05 00:27:58 - OpenVPN > Validating certificate extended key usage . 2017.04.05 00:27:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.05 00:27:58 - OpenVPN > VERIFY EKU OK . 2017.04.05 00:27:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:27:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:27:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:27:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.05 00:43:17 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2017.04.05 00:43:17 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2017.04.05 00:43:17 - OpenVPN > Restart pause, 2 second(s) . 2017.04.05 00:43:17 - OS X - PF rules updated, reloading ! 2017.04.05 00:43:17 - Disconnecting . 2017.04.05 00:43:17 - Management - Send 'signal SIGTERM' . 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2017.04.05 00:43:17 - OpenVPN > MANAGEMENT: Client disconnected . 2017.04.05 00:43:17 - OpenVPN > Assertion failed at misc.c:779 . 2017.04.05 00:43:17 - OpenVPN > Exiting due to fatal error . 2017.04.05 00:43:17 - Connection terminated. I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Ethernet) I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Wi-Fi) I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2017.04.05 00:43:17 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2017.04.05 00:43:27 - Checking authorization ... ! 2017.04.05 00:43:28 - Connecting to Hydrus (Netherlands, Alblasserdam) . 2017.04.05 00:43:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2017.04.05 00:43:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2017.04.05 00:43:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102 . 2017.04.05 00:43:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2017.04.05 00:43:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:28 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2017.04.05 00:43:28 - OpenVPN > UDPv4 link local: [undef] . 2017.04.05 00:43:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.9:443 . 2017.04.05 00:43:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.9:443, sid=a3a5b645 7b31f16d . 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.04.05 00:43:39 - OpenVPN > Validating certificate key usage . 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2017.04.05 00:43:39 - OpenVPN > VERIFY KU OK . 2017.04.05 00:43:39 - OpenVPN > Validating certificate extended key usage . 2017.04.05 00:43:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.04.05 00:43:39 - OpenVPN > VERIFY EKU OK . 2017.04.05 00:43:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hydrus, emailAddress=info@airvpn.org . 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:43:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2017.04.05 00:43:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.04.05 00:43:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.04.05 00:43:39 - OpenVPN > [Hydrus] Peer Connection Initiated with [AF_INET]213.152.162.9:443 . 2017.04.05 00:43:41 - OpenVPN > SENT CONTROL [Hydrus]: 'PUSH_REQUEST' (status=1) . 2017.04.05 00:43:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.186 255.255.0.0,peer-id 4' . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2017.04.05 00:43:41 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.04.05 00:43:41 - OpenVPN > route: writing to routing socket: File exists . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.04.05 00:43:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.04.05 00:43:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2017.04.05 00:43:42 - OpenVPN > Opened utun device utun0 . 2017.04.05 00:43:42 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 delete . 2017.04.05 00:43:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.04.05 00:43:42 - OpenVPN > /sbin/ifconfig utun0 10.4.5.186 10.4.5.186 netmask 255.255.0.0 mtu 1500 up . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.186 255.255.0.0 . 2017.04.05 00:43:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.186 . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 213.152.162.9 192.168.0.1 255.255.255.255 . 2017.04.05 00:43:42 - OpenVPN > add net 213.152.162.9: gateway 192.168.0.1: File exists . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.05 00:43:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2017.04.05 00:43:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2017.04.05 00:43:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2017.04.05 00:43:42 - Starting Management Interface . 2017.04.05 00:43:42 - OpenVPN > Initialization Sequence Completed I 2017.04.05 00:43:42 - DNS of a network adapter forced (Ethernet) I 2017.04.05 00:43:42 - DNS of a network adapter forced (Wi-Fi) I 2017.04.05 00:43:42 - DNS of a network adapter forced (Bluetooth PAN) I 2017.04.05 00:43:42 - DNS of a network adapter forced (Thunderbolt Bridge) I 2017.04.05 00:43:42 - Flushing DNS . 2017.04.05 00:43:42 - OS X - PF rules updated, reloading I 2017.04.05 00:43:42 - Checking route I 2017.04.05 00:43:46 - Checking DNS ! 2017.04.05 00:43:46 - Connected. . 2017.04.05 00:43:46 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2017.04.05 00:43:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102 . 2017.04.05 00:58:22 - Updating systems & servers data ... . 2017.04.05 00:58:25 - Systems & servers data update completed
  6. I am experiencing this too, or at least way more than usual. At least once an hour the connection drops, or has radio silence for 30 seconds.
  7. Thanks for the reply! However, I think I figured out the problem! I was trying to enable the network lock via settings: And from what I can see, that doesn't actually enable it immediately. I needed to sign out and enable it. I think there should be a message that pops up here, informing you that you'll need to actually enable it from the login panel, with instructions to do so! After doing this, however, I haven't had any further issues!
  8. I have "activate network lock on startup" enabled. However, I haven't restarted since I enabled it, so does that mean it's not on? I asked google what my IP was while AirVPN was switching to a new server, and it returned my actual IP. I thought network lock prevented leaks?
×
×
  • Create New...